Information Security. Mark Stamp

Читать онлайн книгу.

Information Security - Mark Stamp


Скачать книгу
ection id="u40da59a2-5470-556b-bfc9-0de0e4f9ec40">

      

      Table of Contents

      1  Cover

      2  Title Page

      3  Copyright

      4  Dedication

      5  Preface

      6  About the Authorcontributors Note

      7  Acknowledgments

      8  Chapter 1: Introductions 1.1 The Cast of Characters 1.2 Alice's Online Bank 1.3 About This Book 1.4 The People Problem 1.5 Principles and Practice 1.6 Problems Notes

      9  Part I: Crypto Chapter 2: Classic Crypto 2.1 Introduction 2.2 How to Speak Crypto 2.3 Classic Ciphers 2.4 Classic Crypto in History 2.5 Modern Crypto History 2.6 A Taxonomy of Cryptography 2.7 A Taxonomy of Cryptanalysis 2.8 Summary 2.9 Problems Notes Chapter 3: Symmetric Ciphers 3.1 Introduction 3.2 Stream Ciphers 3.3 Block Ciphers 3.4 Integrity 3.5 Quantum Computers and Symmetric Crypto 3.6 Summary 3.7 Problems Notes Chapter 4: Public Key Crypto 4.1 Introduction 4.2 Knapsack 4.3 RSA 4.4 Diffie–Hellman 4.5 Elliptic Curve Cryptography 4.6 Public Key Notation 4.7 Uses for Public Key Crypto 4.8 Certificates and PKI 4.9 Quantum Computers and Public Key 4.10 Summary 4.11 Problems Notes Chapter 5: Crypto Hash Functions++ 5.1 Introduction 5.2 What is a Cryptographic Hash Function? 5.3 The Birthday Problem 5.4 A Birthday Attack 5.5 Non‐Cryptographic Hashes 5.6 SHA‐3 5.7 HMAC 5.8 Cryptographic Hash Applications 5.9 Miscellaneous Crypto‐Related Topics 5.10 Summary 5.11 Problems Notes

      10  Part II: Access Control Chapter 6: Authentication 6.1 Introduction 6.2 Authentication Methods 6.3 Passwords 6.4 Biometrics 6.5 Something You Have 6.6 Two‐Factor Authentication 6.7 Single Sign‐On and Web Cookies 6.8 Summary 6.9 Problems Notes Chapter 7: Authorization 7.1 Introduction 7.2


Скачать книгу