Information Security. Mark Stamp. Читать онлайн. Newlib. NEWLIB.NET

Автор: Mark Stamp
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Зарубежная компьютерная литература
Год издания: 0
isbn: 9781119505884
Скачать книгу
of Authorization 7.3 Access Control Matrix 7.4 Multilevel Security Models 7.5 Covert Channels 7.6 Inference Control 7.7 CAPTCHA 7.8 Summary 7.9 Problems Notes

      11  Part III: Topics in Network Security Chapter 8: Network Security Basics 8.1 Introduction 8.2 Networking Basics 8.3 Cross‐Site Scripting Attacks 8.4 Firewalls 8.5 Intrusion Detection Systems 8.6 Summary 8.7 Problems Notes Chapter 9: Simple Authentication Protocols 9.1 Introduction 9.2 Simple Security Protocols 9.3 Authentication Protocols 9.4 “Authentication” and TCP 9.5 Zero Knowledge Proofs 9.6 Tips for Analyzing Protocols 9.7 Summary 9.8 Problems Notes Chapter 10: Real‐World Security Protocols 10.1 Introduction 10.2 SSH 10.3 SSL 10.4 IPsec 10.5 Kerberos 10.6 WEP 10.7 GSM 10.8 Summary 10.9 Problems Notes

      12  Part IV: Software Chapter 11: Software Flaws and Malware 11.1 Introduction 11.2 Software Flaws 11.3 Malware 11.4 Miscellaneous Software‐Based Attacks 11.5 Summary 11.6 Problems Notes Chapter 12: Insecurity in Software 12.1 Introduction 12.2 Software Reverse Engineering 12.3 Software Development 12.4 Summary 12.5 Problems Notes

      13  Appendix A‐1 Modular Arithmetic A‐2 Permutations A‐3 Probability A‐4 DES Permutations

      14  Bibliography

      15  Index

      16  End User License Agreement

      List of Tables

      1 Chapter 2Table 2.1 Abbreviated alphabetTable 2.2 Election of 1876 codebookTable 2.3 Excerpt from a German codebookTable 2.4VENONA decrypt of message of 21 September 1944

      2 Chapter 3Table 3.1 RC4 initializationTable 3.2 RC4 keystream byteTable 3.3 DES S‐box 1 (in hexadecimal)Table 3.4 DES key schedule algorithmTable 3.5 AES ByteSub Table 3.6 TEA encryptionTable 3.7 TEA decryption

      3 Chapter 4Table 4.1 Addition on an elliptic curve

      4 Chapter 5Table 5.1 Steps in round

of SHA‐3Table 5.2 Simple steganography example

      5 Chapter 6Table 6.1 Iris scan distance and fraud rateTable 6.2 Biometric equal error rates [121]

      6 Chapter