Die Antwortzeit im Portal kann derzeit länger als üblich sein. Wir bitten um Entschuldigung.
Export
Filter
Type of Medium
Language
Region
Years
Subjects(RVK)
  • 1
    Online Resource
    Online Resource
    Waltham, MA :Syngress,
    UID:
    almatuudk_9922564941202884
    Format: 1 online resource (xxiv, 356 pages) : , illustrations (some color)
    Edition: First edition.
    ISBN: 9780124200470 , 0124200478
    Series Statement: Gale eBooks
    Content: This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, ac
    Note: Description based upon print version of record. , Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing , 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm , The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2) , Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem , 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications , 14. Summary , English
    Additional Edition: ISBN 9780124166813
    Additional Edition: ISBN 0124166814
    Additional Edition: ISBN 9781299819498
    Additional Edition: ISBN 1299819494
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_012416681
    Format: [65] S. , zahlr. Ill. , 30 cm
    ISBN: 3267000025
    Language: German
    Subjects: Art History
    RVK:
    Keywords: Ausstellungskatalog
    Author information: Beuys, Joseph 1921-1986
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Waltham, MA :Syngress,
    UID:
    edocfu_9959238944702883
    Format: 1 online resource (xxiv, 356 pages) : , illustrations (some color)
    Edition: First edition.
    ISBN: 0-12-420047-8
    Series Statement: Gale eBooks
    Content: This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, ac
    Note: Description based upon print version of record. , Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing , 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm , The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2) , Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem , 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications , 14. Summary , English
    Additional Edition: ISBN 0-12-416681-4
    Additional Edition: ISBN 1-299-81949-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Waltham, MA :Syngress,
    UID:
    edoccha_9959238944702883
    Format: 1 online resource (xxiv, 356 pages) : , illustrations (some color)
    Edition: First edition.
    ISBN: 0-12-420047-8
    Series Statement: Gale eBooks
    Content: This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, ac
    Note: Description based upon print version of record. , Front Cover; Cyber Security and IT Infrastructure Protection; Copyright Page; Contents; Acknowledgements; About the Editor; Contributors; Introduction; Organization of this Book; 1. Fault Tolerance and Resilience in Cloud Computing Environments; 1. Introduction; 2. Cloud Computing Fault Model; Cloud Computing Architecture; Failure Behavior of Servers; Failure Behavior of the Network; 3. Basic Concepts on Fault Tolerance; 4. Different Levels of Fault Tolerance in Cloud Computing; 5. Fault Tolerance against Crash Failures in Cloud Computing , 6. Fault Tolerance against Byzantine Failures in Cloud Computing7. Fault Tolerance as a Service in Cloud Computing; 8. Summary; Chapter Review Questions/Exercises; True/False; Multiple Choice; Exercise; Problem; Hands-On Projects; Project; Case Projects; Problem; Optional Team Case Project; Problem; Acknowledgments; References; 2. Data Encryption; 1. Need for Cryptography; Authentication; Confidentiality; Integrity; Nonrepudiation; 2. Mathematical Prelude to Cryptography; Mapping or Function; Probability; Complexity; 3. Classical Cryptography; The Euclidean Algorithm , The Extended Euclidean AlgorithmModular Arithmetic; Congruence; Residue Class; Inverses; Fundamental Theorem of Arithmetic; Congruence Relation Defined; Substitution Cipher; Transposition Cipher; 4. Modern Symmetric Ciphers; S-Box; P-Boxes; Product Ciphers; 5. Algebraic Structure; Definition Group; Definitions of Finite and Infinite Groups (Order of a Group); Definition Abelian Group; Examples of a Group; Definition: Subgroup; Definition: Cyclic Group; Rings; Examples; Definition: Field; Examples; Finite Fields GF(2n); Modular Polynomial Arithmetic Over GF(2) , Using a Generator to Represent the Elements of GF(2n)GF(23) is a Finite Field; 6. The Internal Functions of Rijndael in AES Implementation; Mathematical Preliminaries; State; The S-Box (SubByte); ShiftRows; Mixing; Subkey Addition; Putting it Together; Round; 7. Use of Modern Block Ciphers; The Electronic Code Book (ECB); Cipher-Block Chaining (CBC); 8. Public-Key Cryptography; Review: Number Theory; Coprimes; Cardinality of Primes; Factoring; Fermat's Little Theorem; Discrete Logarithm; Primitive Roots; 9. Cryptanalysis of RSA; Factorization Attack; Discrete Logarithm Problem , 10. Diffie-Hellman AlgorithmDiffie-Hellman Problem; 11. Elliptic Curve Cryptosystems; An Example; Addition Formula; Example of Elliptic Curve Addition; EC Security; 12. Message Integrity and Authentication; Cryptographic Hash Functions; Preimage Resistance; Second Preimage Resistance (Weak Collision Resistance); Strong Collision Resistance; Message Authentication; Digital Signature; Message Integrity Uses a Hash Function in Signing the Message; RSA Digital Signature Scheme; RSA Digital Signature and the Message Digest; 13. Triple Data Encryption Algorithm (TDEA) Block Cipher; Applications , 14. Summary , English
    Additional Edition: ISBN 0-12-416681-4
    Additional Edition: ISBN 1-299-81949-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 0124166814?
Did you mean 0124166881?
Did you mean 0124166849?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages