This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of …
Table of Contents Chapter 1. Introduction Chapter 2. Basic Techniques for Data Security Chapter 3. Cloud Storage Reliability Chapter 4. Secure Deduplication Chapter 5. Secure Keyword Search Chapter 6. Secure Data Provenance Chapter 7. Secure Data Time-Stamping Chapter 8. Summary and Future Research D
Table of Contents Prologue xv Part 1 The Making of a Hacker 1 Rough Start 3 2 Just Visiting 7 3 Original Sin 20 4 Escape Artist 34 5 All Your Phone Lines Belong to Me 44 6 Will Hack for Love 53 7 Hitched in Haste 62 8 Lex Luthor 72 9 The Kevin Mitnick Discount Plan 94 10 Mystery Hacker 102 Part 2 Eric 11 Foul Play 111 12 You Can Never Hide 116 13 The Wiretapper 126 14 You…
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their va…
Table of Contents Part I Considering the Typical User Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication Permissions and Privacy Privacy and Tracking Part II Considering the Malicious User A Framework for Analysis Attackers’ Accounts Environmentally and Politically Conscious Crypto Part III Designing Solutions Based on Typical and Malicious Users So…
Table of Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2…
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies…
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…
This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs' exposu…
This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to o…