CONTENTS: Part 1: Symmetric Key Encipherment Chapter 2: Mathematics of Cryptography Chapter 3: Traditional Symmetric Key Ciphers Chapter 4: Mathematics of Cryptography Chapter 5: Introduction to Modern Symmetric-Key Ciphers Chapter 6: Data Encryption Standard (DES) Chapter 7: Advanced Encryption Standard Chapter 8: Encipherment Using Modern Symmetric Key Ciphers Part 2: Asymm…
CONTENTS: 1. OS and network security / Roberto Di Pietro and Nino Vincenzo Verde 2. Authentication / Roberto Di Pietro and Nino Vincenzo Verde 3. Classification of attacks on cryptographic protocols / Luca Spalazzi and Simone Tacconi 4. Wi-fi security / Sufian Yousef 5. Auditing, penetration testing and ethical hacking / Frank Leonhardt 6. VoIP security issues / Frank Leonhardt 7. …
Terdapat bibliografi dan indeks. CONTENTS: 1. Introduction to Side-Channel Attacks (Standaert, Fran
Anak Judul: Secure communication device (kumpulan artikel) DAFTAR ISI: 1. Pendahuluan 2. Hasil Penelususran < >Secure communication: quantum cryptography with a photon turnstile < >Commmunication security system < >Assessing security of information technology < >System and method for synchronizing one time pad encryption keys for secure communicati…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Anak judul: the hands-on guide to dissecting malicious software. Malware Analysis Primer Basic Static Techniques < >Antivirus Scanning: A Useful First Step < >Hashing: A Fingerprint for Malware < >Finding Strings < >Packed and Obfuscated Malware < >Portable Executable File Format < >Linked Libraries and Functions < >Static Ana…
A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.