Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 20 of 129
Previous Record Next Record
E-Book/E-Doc

Title Cyber security and IT infrastructure protection / edited by John R. Vacca.

Imprint Amsterdam ; Boston : Syngress, 2013.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Summary This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding. Chapter Review Questions/Exercises and Case Studies. Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc. Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
Note Print version record.
Bibliography Includes bibliographical references and index.
Contents Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing
6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm
The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2)
Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem
10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications
Subject Internet -- Security measures.
Internet -- Sécurité -- Mesures.
Internet -- Security measures
Added Author Vacca, John R.
Other Form: Print version: 9780124166813
ISBN 1299819494 (electronic bk.)
9781299819498 (electronic bk.)
0124200478
9780124200470
9780124166813
0124166814
Standard No. AU@ 000052404603
CHNEW 000898845
CHNEW 001000943
CHNEW 001026505
DEBBG BV041777986
DEBBG BV042314343
DEBSZ 404324495
DEBSZ 405350384
DEBSZ 431497265
NZ1 15197935
ZWZ 178523321
AU@ 000066230725
DKDLA 820120-katalog:999937993805765

 
    
Available items only