Narrow your search
Listing 1 - 9 of 9
Sort by

Periodical
网络与信息安全学报/#/网络与信息安全学报 [[Wang Luo Yu Xin Xi An Quan Xue Bao]]
Author:
Year: 2015 Publisher: Beijing : Beijing xin tong chuan mei you xian ze ren gong si,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
网络与信息安全学报/#/网络与信息安全学报 [[Wang Luo Yu Xin Xi An Quan Xue Bao]]
Author:
Year: 2015 Publisher: Beijing : Beijing xin tong chuan mei you xian ze ren gong si,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
网络与信息安全学报/#/网络与信息安全学报 [[Wang Luo Yu Xin Xi An Quan Xue Bao]]
Author:
Year: 2015 Publisher: Beijing : Beijing xin tong chuan mei you xian ze ren gong si,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Introduction to modern cryptography
Authors: ---
ISBN: 9781466570269 1466570261 Year: 2015 Publisher: Boca Raton : CRC Press/Taylor & Francis Group,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems ^(and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptog raphy, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study. "--


Book
Les objets connectés : sécurité juridique et technique
Author:
ISBN: 9782711022267 2711022269 Year: 2015 Publisher: Paris : LexisNexis,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Quelle protection pour nos données personnelles ? Analysant la question de la sécurité juridique liée aux objets connectés (montres, bracelets, lunettes…), l’ouvrage se penche sur le statut des données personnelles au regard de la loi « Informatique et Libertés » et sur l’existence d’une réglementation pénale spécifique. À toutes ces interrogations viennent s’ajouter des réflexions éthiques relatives au risque de la collecte systématique des données au regard du respect des droits fondamentaux et notamment du droit à l’oubli. À la fois technique et juridique, cet ouvrage est un outil indispensable pour tous ceux qui souhaitent comprendre l’environnement juridique global de ces nouvelles technologies.


Book
Data and Goliath : the hidden battles to collect your data and control your world
Author:
ISBN: 9780393244816 Year: 2015 Publisher: New York, N.Y. : W.W. Norton & Company,


Book
Information security analytics : finding security insights, patterns and anomalies in big data
Authors: --- ---
ISBN: 0128005068 9780128002070 9780128005064 0128002077 1322341036 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covere


Periodical
Journal of cybersecurity.
ISSN: 20572093 Year: 2015 Publisher: Oxford : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The fully open access Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security. The journal is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the human aspects of cybersecurity. Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form, and is committed to providing quality conceptual and empirical research, as well as scholarship, that is grounded in real-world implications and solutions.


Book
Surfons tranquille 3.0 !
Authors: --- ---
ISBN: 9782873869557 2873869550 Year: 2015 Publisher: Bruxelles Racine

Loading...
Export citation

Choose an application

Bookmark

Abstract

Internet est devenu l'outil incontournable pour l'organisation de nos loisirs ou encore pour la gestion de notre vie quotidienne. Il est aussi désormais le principal outil de communication de la planète. Mais qui en connait vraiment les dangers? En vous aidant à trouver le bon mot de passe, à bien choisir votre antivirus, à acquérir les bons réflexes derrière le clavier, cet ouvrage vous permettra de profiter de ce formidable outil en toute sécurité. Divisé en deux grands chapitres (La Sécurité et Les Arnaques), cette version mise à jour vous fera découvrir les bons conseils pour configurer vos outils numériques, vous aidera à profiter sans risque des réseaux sociaux et vous donnera de nombreux trucs pour déjouer les pièges tendus par les acteurs malveillants qui sévissent sur le Net. Sous une forme simple et compréhensible, vous découvrirez comment désormais surfer tranquille sur votre ordinateur, votre smartphone ou votre tablette. [Source: d'après la 4e de couv. ].

Listing 1 - 9 of 9
Sort by