Information Security. Mark Stamp

Читать онлайн.
Название Information Security
Автор произведения Mark Stamp
Жанр Зарубежная компьютерная литература
Серия
Издательство Зарубежная компьютерная литература
Год выпуска 0
isbn 9781119505884



Скачать книгу

ection id="u40da59a2-5470-556b-bfc9-0de0e4f9ec40">

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Copyright

      4  Dedication

      5  Preface

      6  About the Authorcontributors Note

      7  Acknowledgments

      8  Chapter 1: Introductions 1.1 The Cast of Characters 1.2 Alice's Online Bank 1.3 About This Book 1.4 The People Problem 1.5 Principles and Practice 1.6 Problems Notes

      9  Part I: Crypto Chapter 2: Classic Crypto 2.1 Introduction 2.2 How to Speak Crypto 2.3 Classic Ciphers 2.4 Classic Crypto in History 2.5 Modern Crypto History 2.6 A Taxonomy of Cryptography 2.7 A Taxonomy of Cryptanalysis 2.8 Summary 2.9 Problems Notes Chapter 3: Symmetric Ciphers 3.1 Introduction 3.2 Stream Ciphers 3.3 Block Ciphers 3.4 Integrity 3.5 Quantum Computers and Symmetric Crypto 3.6 Summary 3.7 Problems Notes Chapter 4: Public Key Crypto 4.1 Introduction 4.2 Knapsack 4.3 RSA 4.4 Diffie–Hellman 4.5 Elliptic Curve Cryptography 4.6 Public Key Notation 4.7 Uses for Public Key Crypto 4.8 Certificates and PKI 4.9 Quantum Computers and Public Key 4.10 Summary 4.11 Problems Notes Chapter 5: Crypto Hash Functions++ 5.1 Introduction 5.2 What is a Cryptographic Hash Function? 5.3 The Birthday Problem 5.4 A Birthday Attack 5.5 Non‐Cryptographic Hashes 5.6 SHA‐3 5.7 HMAC 5.8 Cryptographic Hash Applications 5.9 Miscellaneous Crypto‐Related Topics 5.10 Summary 5.11 Problems Notes

      10  Part II: Access Control Chapter 6: Authentication 6.1 Introduction 6.2 Authentication Methods 6.3 Passwords 6.4 Biometrics 6.5 Something You Have 6.6 Two‐Factor Authentication 6.7 Single Sign‐On and Web Cookies 6.8 Summary 6.9 Problems Notes Chapter 7: Authorization 7.1 Introduction 7.2