Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Computer networks --- Computer security --- Réseaux d'ordinateurs --- Sécurité informatique --- Security measures --- Sécurité --- Mesures
Choose an application
Computer networks --- Computer security --- Réseaux d'ordinateurs --- Sécurité informatique --- Computer security. --- Security measures --- Sécurité --- Mesures --- Security measures.
Choose an application
Computer networks --- Computer security --- Réseaux d'ordinateurs --- Sécurité informatique --- Computer networks --- Computer security. --- Security measures --- Sécurité --- Mesures --- Security measures.
Choose an application
"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems ^(and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptog raphy, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study. "--
Choose an application
Quelle protection pour nos données personnelles ? Analysant la question de la sécurité juridique liée aux objets connectés (montres, bracelets, lunettes…), l’ouvrage se penche sur le statut des données personnelles au regard de la loi « Informatique et Libertés » et sur l’existence d’une réglementation pénale spécifique. À toutes ces interrogations viennent s’ajouter des réflexions éthiques relatives au risque de la collecte systématique des données au regard du respect des droits fondamentaux et notamment du droit à l’oubli. À la fois technique et juridique, cet ouvrage est un outil indispensable pour tous ceux qui souhaitent comprendre l’environnement juridique global de ces nouvelles technologies.
Computer security --- Computer networks --- Internet --- Data protection --- Sécurité informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Law and legislation --- Droit --- Internet des objets --- Informatique --- Sécurité informatique --- Réseaux d'ordinateurs --- Internet des objets. --- Droit. --- France
Choose an application
Human rights --- Information systems --- Computer architecture. Operating systems --- Electronic surveillance --- Information technology --- Computer security --- Privacy, Right of --- Social control --- Surveillance électronique --- Technologie de l'information --- Sécurité informatique --- Droit à la vie privée --- Contrôle social --- Social aspects --- Aspect social --- Computer security. --- Surveillance électronique --- Sécurité informatique --- Droit à la vie privée --- Contrôle social
Choose an application
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covere
Big data --- Computer security. --- Information resources management --- Sécurité informatique --- Security measures. --- Sécurité informatique --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data sets, Large --- Large data sets --- Data sets --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management --- Management information systems --- Protection --- Security measures
Choose an application
The fully open access Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security. The journal is premised on the belief that computer science-based approaches, while necessary, are not sufficient to tackle cybersecurity challenges. Instead, scholarly contributions from a range of disciplines are needed to understand the human aspects of cybersecurity. Journal of Cybersecurity provides a hub around which the interdisciplinary cybersecurity community can form, and is committed to providing quality conceptual and empirical research, as well as scholarship, that is grounded in real-world implications and solutions.
Internet --- Security measures --- Periodicals --- Sécurité --- Mesures --- Périodiques --- Computer security --- Cryptography --- Computer science --- Computer science. --- Computer security. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Informatics --- security --- cryptography --- cybersecurity --- information security --- privacy --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data protection --- Security systems --- Hacking --- Science --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Sécurité informatique --- Cryptographie --- Informatique
Choose an application
Internet est devenu l'outil incontournable pour l'organisation de nos loisirs ou encore pour la gestion de notre vie quotidienne. Il est aussi désormais le principal outil de communication de la planète. Mais qui en connait vraiment les dangers? En vous aidant à trouver le bon mot de passe, à bien choisir votre antivirus, à acquérir les bons réflexes derrière le clavier, cet ouvrage vous permettra de profiter de ce formidable outil en toute sécurité. Divisé en deux grands chapitres (La Sécurité et Les Arnaques), cette version mise à jour vous fera découvrir les bons conseils pour configurer vos outils numériques, vous aidera à profiter sans risque des réseaux sociaux et vous donnera de nombreux trucs pour déjouer les pièges tendus par les acteurs malveillants qui sévissent sur le Net. Sous une forme simple et compréhensible, vous découvrirez comment désormais surfer tranquille sur votre ordinateur, votre smartphone ou votre tablette. [Source: d'après la 4e de couv. ].
Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Internet --- Protection de l'information (informatique) --- Réseaux sociaux (internet) --- Criminalité informatique. --- Ordinateurs --- Messageries électroniques. --- Réseaux sociaux (Internet) --- Web 2.0. --- Commerce électronique. --- Enfants internautes. --- Mesures de sûreté --- Guides pratiques et mémentos. --- Mesures de sûreté. --- Accès --- Contrôle. --- Sécurité --- Mesures. --- Réseaux sociaux (internet) --- Criminalité informatique. --- Messageries électroniques. --- Réseaux sociaux (Internet) --- Commerce électronique. --- Mesures de sûreté --- Guides pratiques et mémentos. --- Mesures de sûreté. --- Accès --- Contrôle. --- Sécurité --- Criminalité informatique --- Mesures --- Contrôle --- Internet - Sécurité - Mesures --- Ordinateurs - Accès - Contrôle
Listing 1 - 9 of 9 |
Sort by
|