MARC details
000 -CABECERA |
campo de control de longitud fija |
12979nam a2200469 a 4500 |
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL |
campo de control |
OSt |
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN |
campo de control |
20230629103054.0 |
008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL |
campo de control de longitud fija |
230628s2020 eu ad||| |||| 00| 0 eng d |
020 ## - NÚMERO INTERNACIONAL ESTÁNDAR DEL LIBRO |
Número Internacional Estándar del Libro |
9781683925316 |
040 ## - FUENTE DE LA CATALOGACIÓN |
Agencia de catalogación original |
Co-BrCUA |
Idioma de catalogación |
spa |
Normas de descripción |
RCAA2 |
Centro/agencia transcriptor |
Co-BrCUA |
082 04 - NÚMERO DE LA CLASIFICACIÓN DECIMAL DEWEY |
Número de clasificación |
005.8 |
Clave de autor |
C496 2020 |
Número de edición |
23 |
100 ## - ENTRADA PRINCIPAL--NOMBRE DE PERSONA |
Nombre de persona |
Chauhan, S. R. |
9 (RLIN) |
34708 |
245 ## - MENCIÓN DE TÍTULO |
Título |
Computer securoty and encryption : |
Resto del título |
an introduction / |
Mención de responsabilidad, etc. |
S. R. Chauhan y S. Jangra |
260 ## - PUBLICACIÓN, DISTRIBUCIÓN, ETC. |
Lugar de publicación, distribución, etc. |
Boston : |
Nombre del editor, distribuidor, etc. |
Mercury learning and information, |
Fecha de publicación, distribución, etc. |
2020 |
300 ## - DESCRIPCIÓN FÍSICA |
Extensión |
350 páginas : |
Otras características físicas |
Ilustraciones, gráficas; |
Dimensiones |
23 cm |
336 ## - TIPO DE CONTENIDO |
Fuente |
rdacontent |
Término de tipo de contenido |
Texto |
Código de tipo de contenido |
txt |
337 ## - TIPO DE MEDIO |
Fuente |
rdamedia |
Nombre/término del tipo de medio |
Sin mediación |
Código del tipo de medio |
n |
338 ## - TIPO DE SOPORTE |
Fuente |
rdacarrier |
Nombre/término del tipo de soporte |
Volumen |
Código del tipo de soporte |
nc |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 1: Security Concepts |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
1.1 Security Introduction <br/>1.2 The Need for Security <br/>1.3 Security Approaches <br/>1.3.1 Security Models<br/>1.3.2 Security Management Practices<br/>1.4 Principles of Security <br/>1.4.1 Confidentiality <br/>1.4.2 Authentication <br/>1.4.3 Integrity<br/>1.4.4 Non-Repudiation<br/>1.4.5 Access Control <br/>1.4.6 Availability <br/>1.5 Types of Attacks <br/>1.5.1 Theoretical Concepts <br/>1.5.2 The Practical Side of Attacks <br/>1.5.3 Java Security <br/>1.5.4 Specific Attacks <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 2: Public Key Cryptography and SSL |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
2.1 One-Way Functions Introduction <br/>2.1.1 Motivation<br/>2.2 One-Way Functions: Definitions <br/>2.2.1 (Strong) One-Way Functions <br/>2.3 Digital Signatures <br/>2.4 Hash Functions <br/>2.5 Centralized Certificates <br/>2.6 Random Key Generation <br/>2.7 Authentication Methods <br/>2.8 Email Security <br/>2.9 Challenge Handshake Authentication <br/>2.10 Automatic Rekeying <br/>2.11 Biometrics <br/>2.12 Public Key Cryptography <br/>2.13 Mutual Authentication <br/>2.14 Multifactor Authentication <br/>2.15 Elements of an Authentication System <br/>2.16 Attacks <br/>2.17 IP Security Encryption Router <br/>2.18 Cryptography <br/>2.19 Cryptosystems <br/>2.20 Key Based Methodology <br/>2.21 Symmetric (Private) Methodology <br/>2.22 Asymmetric (Public) Methodology <br/>2.23 Key Distribution <br/>2.24 Asymmetric algorithms<br/>2.25 Hash Functions vs. Key-Based Cryptosystems <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 3: World Wide Web Transaction Security |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
3.1 Internet Infrastructure <br/>3.1.1 Internet <br/>3.1.2 Internet Service Providers (ISPs) <br/>3.1.3 Point of Presences (POPs) <br/>3.1.4 Network Access Point (NAP) <br/>3.1.5 Local Area Network (LAN)<br/>3.2 Network Infrastructure <br/>3.3 Basic Issues in Secret Key Management <br/>3.3.1 Links <br/>3.3.2 Routers <br/>3.4 Addressing <br/>3.5 System Security <br/>3.6 Basic Issues in Internet Transaction Security <br/>3.7 Network Information and Network Infrastructure Securities <br/>3.8 Importance of Network Infrastructure Security <br/>3.9 Internet Infrastructure Vulnerability <br/>3.9.1 Solutions Usually Require Large Scale Modifications <br/>3.9.2 Security and Performance Tradeoffs <br/>3.9.3 Security is Only as Strong as the Weakest Link <br/>3.9.4 Attacks Can Be Easily Launched and Are Difficult to Trace <br/>3.10 Network Infrastructure Security Switching <br/>3.11 Switch Security is Important <br/>3.12 How Switches Can Be Attacked <br/>3.12.1 Mac Flooding <br/>3.12.2 Content Addressable Memory Table <br/>3.12.3 Mac Flooding Attacks <br/>3.12.4 Mitigation <br/>3.12.5 ARP Spoofing <br/>3.13 ARP <br/>3.14 The ARP Poisoning Process <br/>3.15 Man-in-the Middle Attack <br/>3.15.1 DoS Attack <br/>3.15.2 Hijacking <br/>3.15.3 Spoofing WAN Traffic <br/>3.16 Static ARP Entries<br/>3.16.1 Detection <br/>3.16.2 No Cache Update<br/>3.17 STP Attacks <br/>3.18 Topology Change (Bit 1) <br/>3.181 Bridge ID <br/>3.18.2 Port State <br/>3.18.3 STP Timer <br/>3.19 How STP Works <br/>3.20 Topology Change<br/>3.20.1 Failure to Receive the Hello Bpdus <br/>3.21 STP Attack Scenarios <br/>3.22 Root Claim and MITM <br/>3.23 Affecting Network Performance <br/>3.24 Countermeasures Guard <br/>3.24.1 BPDU Guard <br/>3.25 Root Guard<br/>3.26 VLAN Attacks<br/>3.26.1 Easier Network Administration <br/>3.26.2 Improved Bandwidth Usage <br/>3.26.3 Blocking Broadcast Traffic <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 4: IP Security and Firewalls |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
4.1 Internet Firewalls <br/>4.2 Protective Devices <br/>4.2.1 Your Data <br/>4.2.2 Resources <br/>4.2.3 Reputation <br/>4.3 Types of Attacks <br/>4.3.1 Intrusion <br/>4.3.2 Denial of Service <br/>4.4 Network Taps <br/>4.5 IP Security Firewall <br/>4.6 Joy Riders<br/>4.7 Vandals <br/>4.8 Scorekeeper <br/>4.9 Spies: Industrial and Otherwise <br/>4.10 Irresponsible Mistakes and Accidents <br/>4.11 Theoretical Attacks <br/>4.12 Who Do You Trust? <br/>4.12.1 No Security <br/>4.13 Security Through Obscurity <br/>4.14 Host Security <br/>4.15 Network Security Model <br/>4.15.1 No Security Model Can Do It All <br/>4.15.2 Internet Firewalls <br/>4.16 A Firewall Can Log Internet Activity Efficiently <br/>4.17 A Firewall Limits Your Exposure <br/>4.18 A Firewall Can't Protect Against Malicious Insiders <br/>4.19 A Firewall Can't Protect Connections That Don't Go Through It <br/>4.20 A Firewall Can't Protect Against New Threats <br/>4.21 A Firewall Can't Fully Protect Against Viruses <br/>4.22 A Firewall Can't Set Itself Up Correctly <br/>4.22.1 What's Wrong with Firewalls? <br/>4.23 Firewalls Interfere with the Internet <br/>4.24 Firewalls Don't Deal with the Real Problem <br/>4.241 Philosophical Arguments <br/>4.25 Buying Versus Building<br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 5: Public Key Certificates |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
5.1 Security Objectives <br/>5.1.1 Security Issues when Connecting to the Internet <br/>5.1.2 Protecting Confidential Information<br/>5.2 Protecting Your Network: Maintaining Internal Network System Integrity <br/>5.2.1 Network Packet Sniffers <br/>5.2.2 IP Spoofing <br/>5.2.3 Password Attacks <br/>5.2.4 Denial-of-Service Attacks <br/>5.2.5 Application Layer Attacks <br/>5.3 Trusted, Untrusted, and Unknown Networks <br/>5.3.1 Trusted Networks <br/>5.3.2 Untrusted Networks <br/>5.3.3 Unknown Networks <br/>5.4 Establishing a Security Perimeter <br/>5.5 Perimeter Networks <br/>5.6 Developing Your Security Design <br/>5.6.1 Know Your Enemy <br/>5.6.2 Count the Cost <br/>5.6.3 Identify Any Assumptions <br/>5.6.4 Control Your Secrets <br/>5.6.5 Human Factors <br/>5.6.6 Know Your Weaknesses <br/>5.6.7 Limit the Scope of Access <br/>5.6.8 Understand Your Environment <br/>5.6.9 Limit Your Trust <br/>5.6.10 Remember Physical Security <br/>5.6.11 Make Security Pervasive <br/>5.7 Secure Sockets Layer <br/>5.8 Email Security <br/>5.9 Secure Email Protocols <br/>5.9.1 Pretty Good Privacy (PGP) <br/>5.9.2 Privacy Enhanced Mail (PEM) <br/>5.9.3 PGP Versus PEM <br/>5.9.4 Secure MIME (S/MIME)<br/>5.10 Web-Based Email Services<br/>5.11 Certification Authority Hierarchies <br/>5.12 Key Recovery and Escrowed Encryption <br/>5.12.1 Key Recovery Methodologies <br/>5.12.2 Key Recovery Entry <br/>5.12.3 Key Escrow <br/>5.13 Strong and Weak Cryptography <br/>5.14 Security Alternatives for Web Forms <br/>5.14.1 Web Security Considerations <br/>5.15 Web Traffic Security Approaches <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 6: Security at the IP Layer |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
6.1 Cryptography <br/>6.2 Stream Ciphers <br/>6.3 Block Ciphers <br/>6.3.1 Breaking Ciphers <br/>6.4 Known Plaintext Attack <br/>6.4.1 Chosen Plaintext Attack <br/>6.5 Cryptanalysis <br/>6.6 Brute Force <br/>6.6.1 Social Engineering <br/>6.6.2 Other Types of Attacks <br/>6.7 Encryption <br/>6.8 Symmetric Key Encryption <br/>6.9 Data Encryption Standard (DES) <br/>6.9.1 International Data Encryption Algorithm (IDEA) <br/>6.9.2 CAST <br/>6.9.3 Rivest Cipher #4 (RC4) <br/>6.10 Asymmetric Key Encryption <br/>6.11 Public Key Cryptosystems <br/>6.11.1 Diffic-Hellman <br/>6.11.2 Message Integrity<br/>6.12 Secure Hash Algorithm-1 (SHA-1) <br/>6.12.1 Authentication <br/>6.13 Public Key Infrastructure <br/>6.14 Secrete Key Exchange <br/>6.15 Web Security <br/>6.15.1 Threats <br/>6.15.2 Secure Naming <br/>6.16 DNS Spoofing <br/>6.16.1 Secure DNS <br/>6.16.2 Self-Certifying Names <br/>6.17 The Secure Sockets Layer <br/>6.18 RSA Algorithm <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 7: Remote Access with Internet Protocol Security |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
7.1 Wireless Technologies <br/>7.1.1 Types of Wireless Technology <br/>7.2 Base Station <br/>7.3 Technology of Offline Message Keys<br/>7.4 Advanced Signaling Techniques Used to Mitigate Multipath <br/>7.4.1 QAM with DFE <br/>7.4.2 Spread Spectrum <br/>7.4.3 FHHS <br/>7.4.4 FDM <br/>7.4.5 OFDM <br/>7.4.6 VOFDM <br/>7.5 Benefits of Using Wireless Solutions <br/>7.6 Earth Curvature Calculation for Line-of-Sight Systems <br/>7.7 Microwave Communication Links <br/>7.7.1 What is Multipath? <br/>7.7.2 Multipath in Non-LOS Environments<br/>7.8 Elements of a Total Network Solution <br/>7.8.1 Premises Networks <br/>7.8.2 Access Networks <br/>7.8.3 Core Networks <br/>7.8.4 Network Management <br/>7.8.5 Deployment <br/>7.9 Billing and Management of Wireless Systems <br/>7.9.1 Example Implementation<br/>7.10 IP Wireless System Advantages <br/>7.11 IP Wireless Services for Small and Medium Businesses <br/>7.12 IP Point-to-Multipoint Architecture <br/>7.13 IP Wireless Open Standards <br/>7.14 IP Vector Orthogonal Frequency-Division Multiplexing <br/>7.14.1 Channel Data Rate <br/>7.14.2 Downstream and Upstream User Bandwidth Allocation <br/>7.14.3 Duplexing Techniques <br/>7.15 Multiple Access Technique <br/>7.15.1 Unsolicited Grant Service <br/>7.15.2 Real-Time Polling Service <br/>7.15.3 Unsolicited Grant Service with Activation Detection <br/>7.15.4 Non-Real-Time Polling Service <br/>7.15.5 Best Effort Service <br/>7.15.6 Committed Information Rate <br/>7.15.7 Frame and Slot Format <br/>7.16 Synchronization Technique (Frame and Slot) <br/>7.17 Average Overall Delay Over Link <br/>7.18 Power Control <br/>7.19 Admission Control <br/>7.20 Requirements for the Cell Radius<br/>7.20.1 Requirement for Frequency Reuse <br/>7.20.2 Radio Resource Management <br/>7.20.3 Spectrum Management in a Cell <br/>7.20.4 Load Balancing of CPES Within an Upstream Channel <br/>7.20.5 Time Slotted Upstream <br/>7.21 Contention Resolution <br/>7.21.1 Traffic Policing <br/>7.22 Interface Specifications Based on the Generic Reference Model <br/>7.23 Wireless Protocol Stack <br/>7.24 System Performance Metrics <br/>7.25 Supercell Network Design <br/>7.26 Transport Layer Products. <br/>7.26.1 P2MP Transport Equipment Element Customer Premises <br/>7.26.2 Rooftop Unit <br/>7.26.3 Basic Receiver <br/>7.26.4 High-Cain Receiver <br/>7.27 Comparison LMDS Environmental Considerations<br/>7.28 WLAN Standards <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 8: Virtual Private Networks |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
8.1 Security Policy <br/>8.2 IPSec Network <br/>8.3 IPSec Protocols Security <br/>8.3.1 Authentication Header (AH) <br/>8.3.2 Encapsulated Security Payload (ESP) <br/>8.3.3 IKE Protocol <br/>8.4 NAT-Traversal <br/>8.5 Virtual Private Network (VPN) <br/>8.6 Gateway-to-Gateway Architecture<br/>8.7 Host-to-Gateway Architecture <br/>8.8 Model Comparison <br/>8.9 TCP/IP Network Security Protocol <br/>8.10 Node-to-Node Encryption <br/>8.11 Site-to-Site Encryption <br/>8.12 Where to Encrypt <br/>8.13 Encryption Process <br/>8.14 ESP Packet Fields <br/>8.15 How ESP Works <br/>8.16 ESP Version 3 <br/>8.17 Internet Key Exchange (IKE) <br/>8.18 Phase One Exchange <br/>8.19 Main Mode <br/>8.20 Diffie-Hellman (DH) Group <br/>8.21 Aggressive Mode <br/>8.22 Phase Two Exchange <br/>8.23 Informational Exchange<br/> 8.24 Group Exchange <br/>8.25 IKE Version 2 <br/>8.26 IP Payload Compression Protocol (IPCamp) <br/>8.27 ESP in a Gateway-to-Gateway Architecture <br/>8.28 ESP and IPComp in a Host-to-Gateway Architecture <br/>8.29 ESP and AH in a Host-to-Host Architecture <br/> |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
Chapter 9: The Security of Emerging Technologies |
505 ## - NOTA DE CONTENIDO CON FORMATO |
Nota de contenido con formato |
9.1 Security of Big Data Analytics <br/>9.1.1 Big Data Analysis Can Transform Security Analytics <br/>9.1.2 Big Data Analytics for Security Issues and Privacy Challenges <br/>9.2 Security of Cloud Computing <br/>9.2.1 Cloud Deployment Models<br/>9.2.2 The Three Layers of the Cloud Computing Services Model (Software, Platform, or Infrastructure (SPI) Model) <br/>9.2.3 Security Concerns and Challenges of Cloud Computing <br/>9.2.4 Cloud Security as a Consumer Service <br/>9.3 Security of the Internet of Things (IoT) <br/>9.3.1 Evolution of the IoT <br/>9.3.2 Building Blocks of the Internet of Things (IoT) <br/>9.3.4 IoT Layer Models <br/>9.3.5 Applications of the IoT <br/>9.3.6 New Challenges Created by the IoT <br/>9.3.7 Security Requirements of the IoT <br/>9.3.8 IoT Attacks <br/>9.3.9 Hybrid Encryption Technique <br/>9.3.10 Hybrid Encryption Algarithm Based on DES and DSA <br/>9.3.11 Advance Encryption Standard (AES) <br/>9.3.12 Requirements for Lightweight Cryptography <br/>9.3.13 Lightweight Cryptography <br/>9.3.14 Prevention of Attacks on the IoT <br/>9.4 Security of the Smart Grid <br/>9.4.1 Smart Grid Challenges <br/>9.4.2 Smart Grid Layers <br/>9.4.3 Information Security Risks and Demands of Smart Grids<br/>9.4.4 Smart Grid Security Objectives <br/>9.4.5 The Smart Grid System: Three Major Systems <br/>9.4.6 Types of Security Attacks that can Compromise the Smart Grid Security <br/>9.4.7 Cybersecurity Attacks on a Smart Grid<br/>9.5 Security of SCADA Control Systems <br/>9.5.1 Components of SCADA Systems <br/>9.5.2 SCADA System Layers <br/>9.5.3 Requirements and Features for the Security of Control Systems <br/>9.5.4 Categories of Security Threats to Modern SCADA Systems <br/>9.6 Index Security of Wireless Sensor Networks (WSNs) <br/>9.6.1 WSN Layers <br/>9.6.2 Security Requirements in WSNs <br/>9.6.3 WSN Attack Categories <br/>9.6.4 Security Protocols in WSNs <br/> |
650 14 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento de entrada |
Computer security |
9 (RLIN) |
20921 |
650 10 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento de entrada |
Data encryption |
9 (RLIN) |
34709 |
650 14 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA |
Término de materia o nombre geográfico como elemento de entrada |
Computer networks |
Subdivisión general |
Security measures |
9 (RLIN) |
20788 |
700 ## - PUNTO DE ACCESO ADICIONAL--NOMBRE DE PERSONA |
Nombre de persona |
Jangra, S. |
9 (RLIN) |
34710 |
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA) |
Fuente del sistema de clasificación o colocación |
Dewey Decimal Classification |
Tipo de ítem Koha |
Libro de Reserva |
Parte de la signatura que identifica el ejemplar (Parte del ítem) |
005.8 C496 2020 |