Computer securoty and encryption : (Record no. 67661)

MARC details
000 -CABECERA
campo de control de longitud fija 12979nam a2200469 a 4500
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
campo de control OSt
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN
campo de control 20230629103054.0
008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL
campo de control de longitud fija 230628s2020 eu ad||| |||| 00| 0 eng d
020 ## - NÚMERO INTERNACIONAL ESTÁNDAR DEL LIBRO
Número Internacional Estándar del Libro 9781683925316
040 ## - FUENTE DE LA CATALOGACIÓN
Agencia de catalogación original Co-BrCUA
Idioma de catalogación spa
Normas de descripción RCAA2
Centro/agencia transcriptor Co-BrCUA
082 04 - NÚMERO DE LA CLASIFICACIÓN DECIMAL DEWEY
Número de clasificación 005.8
Clave de autor C496 2020
Número de edición 23
100 ## - ENTRADA PRINCIPAL--NOMBRE DE PERSONA
Nombre de persona Chauhan, S. R.
9 (RLIN) 34708
245 ## - MENCIÓN DE TÍTULO
Título Computer securoty and encryption :
Resto del título an introduction /
Mención de responsabilidad, etc. S. R. Chauhan y S. Jangra
260 ## - PUBLICACIÓN, DISTRIBUCIÓN, ETC.
Lugar de publicación, distribución, etc. Boston :
Nombre del editor, distribuidor, etc. Mercury learning and information,
Fecha de publicación, distribución, etc. 2020
300 ## - DESCRIPCIÓN FÍSICA
Extensión 350 páginas :
Otras características físicas Ilustraciones, gráficas;
Dimensiones 23 cm
336 ## - TIPO DE CONTENIDO
Fuente rdacontent
Término de tipo de contenido Texto
Código de tipo de contenido txt
337 ## - TIPO DE MEDIO
Fuente rdamedia
Nombre/término del tipo de medio Sin mediación
Código del tipo de medio n
338 ## - TIPO DE SOPORTE
Fuente rdacarrier
Nombre/término del tipo de soporte Volumen
Código del tipo de soporte nc
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 1: Security Concepts
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 1.1 Security Introduction <br/>1.2 The Need for Security <br/>1.3 Security Approaches <br/>1.3.1 Security Models<br/>1.3.2 Security Management Practices<br/>1.4 Principles of Security <br/>1.4.1 Confidentiality <br/>1.4.2 Authentication <br/>1.4.3 Integrity<br/>1.4.4 Non-Repudiation<br/>1.4.5 Access Control <br/>1.4.6 Availability <br/>1.5 Types of Attacks <br/>1.5.1 Theoretical Concepts <br/>1.5.2 The Practical Side of Attacks <br/>1.5.3 Java Security <br/>1.5.4 Specific Attacks <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 2: Public Key Cryptography and SSL
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 2.1 One-Way Functions Introduction <br/>2.1.1 Motivation<br/>2.2 One-Way Functions: Definitions <br/>2.2.1 (Strong) One-Way Functions <br/>2.3 Digital Signatures <br/>2.4 Hash Functions <br/>2.5 Centralized Certificates <br/>2.6 Random Key Generation <br/>2.7 Authentication Methods <br/>2.8 Email Security <br/>2.9 Challenge Handshake Authentication <br/>2.10 Automatic Rekeying <br/>2.11 Biometrics <br/>2.12 Public Key Cryptography <br/>2.13 Mutual Authentication <br/>2.14 Multifactor Authentication <br/>2.15 Elements of an Authentication System <br/>2.16 Attacks <br/>2.17 IP Security Encryption Router <br/>2.18 Cryptography <br/>2.19 Cryptosystems <br/>2.20 Key Based Methodology <br/>2.21 Symmetric (Private) Methodology <br/>2.22 Asymmetric (Public) Methodology <br/>2.23 Key Distribution <br/>2.24 Asymmetric algorithms<br/>2.25 Hash Functions vs. Key-Based Cryptosystems <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 3: World Wide Web Transaction Security
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 3.1 Internet Infrastructure <br/>3.1.1 Internet <br/>3.1.2 Internet Service Providers (ISPs) <br/>3.1.3 Point of Presences (POPs) <br/>3.1.4 Network Access Point (NAP) <br/>3.1.5 Local Area Network (LAN)<br/>3.2 Network Infrastructure <br/>3.3 Basic Issues in Secret Key Management <br/>3.3.1 Links <br/>3.3.2 Routers <br/>3.4 Addressing <br/>3.5 System Security <br/>3.6 Basic Issues in Internet Transaction Security <br/>3.7 Network Information and Network Infrastructure Securities <br/>3.8 Importance of Network Infrastructure Security <br/>3.9 Internet Infrastructure Vulnerability <br/>3.9.1 Solutions Usually Require Large Scale Modifications <br/>3.9.2 Security and Performance Tradeoffs <br/>3.9.3 Security is Only as Strong as the Weakest Link <br/>3.9.4 Attacks Can Be Easily Launched and Are Difficult to Trace <br/>3.10 Network Infrastructure Security Switching <br/>3.11 Switch Security is Important <br/>3.12 How Switches Can Be Attacked <br/>3.12.1 Mac Flooding <br/>3.12.2 Content Addressable Memory Table <br/>3.12.3 Mac Flooding Attacks <br/>3.12.4 Mitigation <br/>3.12.5 ARP Spoofing <br/>3.13 ARP <br/>3.14 The ARP Poisoning Process <br/>3.15 Man-in-the Middle Attack <br/>3.15.1 DoS Attack <br/>3.15.2 Hijacking <br/>3.15.3 Spoofing WAN Traffic <br/>3.16 Static ARP Entries<br/>3.16.1 Detection <br/>3.16.2 No Cache Update<br/>3.17 STP Attacks <br/>3.18 Topology Change (Bit 1) <br/>3.181 Bridge ID <br/>3.18.2 Port State <br/>3.18.3 STP Timer <br/>3.19 How STP Works <br/>3.20 Topology Change<br/>3.20.1 Failure to Receive the Hello Bpdus <br/>3.21 STP Attack Scenarios <br/>3.22 Root Claim and MITM <br/>3.23 Affecting Network Performance <br/>3.24 Countermeasures Guard <br/>3.24.1 BPDU Guard <br/>3.25 Root Guard<br/>3.26 VLAN Attacks<br/>3.26.1 Easier Network Administration <br/>3.26.2 Improved Bandwidth Usage <br/>3.26.3 Blocking Broadcast Traffic <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 4: IP Security and Firewalls
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 4.1 Internet Firewalls <br/>4.2 Protective Devices <br/>4.2.1 Your Data <br/>4.2.2 Resources <br/>4.2.3 Reputation <br/>4.3 Types of Attacks <br/>4.3.1 Intrusion <br/>4.3.2 Denial of Service <br/>4.4 Network Taps <br/>4.5 IP Security Firewall <br/>4.6 Joy Riders<br/>4.7 Vandals <br/>4.8 Scorekeeper <br/>4.9 Spies: Industrial and Otherwise <br/>4.10 Irresponsible Mistakes and Accidents <br/>4.11 Theoretical Attacks <br/>4.12 Who Do You Trust? <br/>4.12.1 No Security <br/>4.13 Security Through Obscurity <br/>4.14 Host Security <br/>4.15 Network Security Model <br/>4.15.1 No Security Model Can Do It All <br/>4.15.2 Internet Firewalls <br/>4.16 A Firewall Can Log Internet Activity Efficiently <br/>4.17 A Firewall Limits Your Exposure <br/>4.18 A Firewall Can't Protect Against Malicious Insiders <br/>4.19 A Firewall Can't Protect Connections That Don't Go Through It <br/>4.20 A Firewall Can't Protect Against New Threats <br/>4.21 A Firewall Can't Fully Protect Against Viruses <br/>4.22 A Firewall Can't Set Itself Up Correctly <br/>4.22.1 What's Wrong with Firewalls? <br/>4.23 Firewalls Interfere with the Internet <br/>4.24 Firewalls Don't Deal with the Real Problem <br/>4.241 Philosophical Arguments <br/>4.25 Buying Versus Building<br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 5: Public Key Certificates
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 5.1 Security Objectives <br/>5.1.1 Security Issues when Connecting to the Internet <br/>5.1.2 Protecting Confidential Information<br/>5.2 Protecting Your Network: Maintaining Internal Network System Integrity <br/>5.2.1 Network Packet Sniffers <br/>5.2.2 IP Spoofing <br/>5.2.3 Password Attacks <br/>5.2.4 Denial-of-Service Attacks <br/>5.2.5 Application Layer Attacks <br/>5.3 Trusted, Untrusted, and Unknown Networks <br/>5.3.1 Trusted Networks <br/>5.3.2 Untrusted Networks <br/>5.3.3 Unknown Networks <br/>5.4 Establishing a Security Perimeter <br/>5.5 Perimeter Networks <br/>5.6 Developing Your Security Design <br/>5.6.1 Know Your Enemy <br/>5.6.2 Count the Cost <br/>5.6.3 Identify Any Assumptions <br/>5.6.4 Control Your Secrets <br/>5.6.5 Human Factors <br/>5.6.6 Know Your Weaknesses <br/>5.6.7 Limit the Scope of Access <br/>5.6.8 Understand Your Environment <br/>5.6.9 Limit Your Trust <br/>5.6.10 Remember Physical Security <br/>5.6.11 Make Security Pervasive <br/>5.7 Secure Sockets Layer <br/>5.8 Email Security <br/>5.9 Secure Email Protocols <br/>5.9.1 Pretty Good Privacy (PGP) <br/>5.9.2 Privacy Enhanced Mail (PEM) <br/>5.9.3 PGP Versus PEM <br/>5.9.4 Secure MIME (S/MIME)<br/>5.10 Web-Based Email Services<br/>5.11 Certification Authority Hierarchies <br/>5.12 Key Recovery and Escrowed Encryption <br/>5.12.1 Key Recovery Methodologies <br/>5.12.2 Key Recovery Entry <br/>5.12.3 Key Escrow <br/>5.13 Strong and Weak Cryptography <br/>5.14 Security Alternatives for Web Forms <br/>5.14.1 Web Security Considerations <br/>5.15 Web Traffic Security Approaches <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 6: Security at the IP Layer
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 6.1 Cryptography <br/>6.2 Stream Ciphers <br/>6.3 Block Ciphers <br/>6.3.1 Breaking Ciphers <br/>6.4 Known Plaintext Attack <br/>6.4.1 Chosen Plaintext Attack <br/>6.5 Cryptanalysis <br/>6.6 Brute Force <br/>6.6.1 Social Engineering <br/>6.6.2 Other Types of Attacks <br/>6.7 Encryption <br/>6.8 Symmetric Key Encryption <br/>6.9 Data Encryption Standard (DES) <br/>6.9.1 International Data Encryption Algorithm (IDEA) <br/>6.9.2 CAST <br/>6.9.3 Rivest Cipher #4 (RC4) <br/>6.10 Asymmetric Key Encryption <br/>6.11 Public Key Cryptosystems <br/>6.11.1 Diffic-Hellman <br/>6.11.2 Message Integrity<br/>6.12 Secure Hash Algorithm-1 (SHA-1) <br/>6.12.1 Authentication <br/>6.13 Public Key Infrastructure <br/>6.14 Secrete Key Exchange <br/>6.15 Web Security <br/>6.15.1 Threats <br/>6.15.2 Secure Naming <br/>6.16 DNS Spoofing <br/>6.16.1 Secure DNS <br/>6.16.2 Self-Certifying Names <br/>6.17 The Secure Sockets Layer <br/>6.18 RSA Algorithm <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 7: Remote Access with Internet Protocol Security
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 7.1 Wireless Technologies <br/>7.1.1 Types of Wireless Technology <br/>7.2 Base Station <br/>7.3 Technology of Offline Message Keys<br/>7.4 Advanced Signaling Techniques Used to Mitigate Multipath <br/>7.4.1 QAM with DFE <br/>7.4.2 Spread Spectrum <br/>7.4.3 FHHS <br/>7.4.4 FDM <br/>7.4.5 OFDM <br/>7.4.6 VOFDM <br/>7.5 Benefits of Using Wireless Solutions <br/>7.6 Earth Curvature Calculation for Line-of-Sight Systems <br/>7.7 Microwave Communication Links <br/>7.7.1 What is Multipath? <br/>7.7.2 Multipath in Non-LOS Environments<br/>7.8 Elements of a Total Network Solution <br/>7.8.1 Premises Networks <br/>7.8.2 Access Networks <br/>7.8.3 Core Networks <br/>7.8.4 Network Management <br/>7.8.5 Deployment <br/>7.9 Billing and Management of Wireless Systems <br/>7.9.1 Example Implementation<br/>7.10 IP Wireless System Advantages <br/>7.11 IP Wireless Services for Small and Medium Businesses <br/>7.12 IP Point-to-Multipoint Architecture <br/>7.13 IP Wireless Open Standards <br/>7.14 IP Vector Orthogonal Frequency-Division Multiplexing <br/>7.14.1 Channel Data Rate <br/>7.14.2 Downstream and Upstream User Bandwidth Allocation <br/>7.14.3 Duplexing Techniques <br/>7.15 Multiple Access Technique <br/>7.15.1 Unsolicited Grant Service <br/>7.15.2 Real-Time Polling Service <br/>7.15.3 Unsolicited Grant Service with Activation Detection <br/>7.15.4 Non-Real-Time Polling Service <br/>7.15.5 Best Effort Service <br/>7.15.6 Committed Information Rate <br/>7.15.7 Frame and Slot Format <br/>7.16 Synchronization Technique (Frame and Slot) <br/>7.17 Average Overall Delay Over Link <br/>7.18 Power Control <br/>7.19 Admission Control <br/>7.20 Requirements for the Cell Radius<br/>7.20.1 Requirement for Frequency Reuse <br/>7.20.2 Radio Resource Management <br/>7.20.3 Spectrum Management in a Cell <br/>7.20.4 Load Balancing of CPES Within an Upstream Channel <br/>7.20.5 Time Slotted Upstream <br/>7.21 Contention Resolution <br/>7.21.1 Traffic Policing <br/>7.22 Interface Specifications Based on the Generic Reference Model <br/>7.23 Wireless Protocol Stack <br/>7.24 System Performance Metrics <br/>7.25 Supercell Network Design <br/>7.26 Transport Layer Products. <br/>7.26.1 P2MP Transport Equipment Element Customer Premises <br/>7.26.2 Rooftop Unit <br/>7.26.3 Basic Receiver <br/>7.26.4 High-Cain Receiver <br/>7.27 Comparison LMDS Environmental Considerations<br/>7.28 WLAN Standards <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 8: Virtual Private Networks
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 8.1 Security Policy <br/>8.2 IPSec Network <br/>8.3 IPSec Protocols Security <br/>8.3.1 Authentication Header (AH) <br/>8.3.2 Encapsulated Security Payload (ESP) <br/>8.3.3 IKE Protocol <br/>8.4 NAT-Traversal <br/>8.5 Virtual Private Network (VPN) <br/>8.6 Gateway-to-Gateway Architecture<br/>8.7 Host-to-Gateway Architecture <br/>8.8 Model Comparison <br/>8.9 TCP/IP Network Security Protocol <br/>8.10 Node-to-Node Encryption <br/>8.11 Site-to-Site Encryption <br/>8.12 Where to Encrypt <br/>8.13 Encryption Process <br/>8.14 ESP Packet Fields <br/>8.15 How ESP Works <br/>8.16 ESP Version 3 <br/>8.17 Internet Key Exchange (IKE) <br/>8.18 Phase One Exchange <br/>8.19 Main Mode <br/>8.20 Diffie-Hellman (DH) Group <br/>8.21 Aggressive Mode <br/>8.22 Phase Two Exchange <br/>8.23 Informational Exchange<br/> 8.24 Group Exchange <br/>8.25 IKE Version 2 <br/>8.26 IP Payload Compression Protocol (IPCamp) <br/>8.27 ESP in a Gateway-to-Gateway Architecture <br/>8.28 ESP and IPComp in a Host-to-Gateway Architecture <br/>8.29 ESP and AH in a Host-to-Host Architecture <br/>
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato Chapter 9: The Security of Emerging Technologies
505 ## - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 9.1 Security of Big Data Analytics <br/>9.1.1 Big Data Analysis Can Transform Security Analytics <br/>9.1.2 Big Data Analytics for Security Issues and Privacy Challenges <br/>9.2 Security of Cloud Computing <br/>9.2.1 Cloud Deployment Models<br/>9.2.2 The Three Layers of the Cloud Computing Services Model (Software, Platform, or Infrastructure (SPI) Model) <br/>9.2.3 Security Concerns and Challenges of Cloud Computing <br/>9.2.4 Cloud Security as a Consumer Service <br/>9.3 Security of the Internet of Things (IoT) <br/>9.3.1 Evolution of the IoT <br/>9.3.2 Building Blocks of the Internet of Things (IoT) <br/>9.3.4 IoT Layer Models <br/>9.3.5 Applications of the IoT <br/>9.3.6 New Challenges Created by the IoT <br/>9.3.7 Security Requirements of the IoT <br/>9.3.8 IoT Attacks <br/>9.3.9 Hybrid Encryption Technique <br/>9.3.10 Hybrid Encryption Algarithm Based on DES and DSA <br/>9.3.11 Advance Encryption Standard (AES) <br/>9.3.12 Requirements for Lightweight Cryptography <br/>9.3.13 Lightweight Cryptography <br/>9.3.14 Prevention of Attacks on the IoT <br/>9.4 Security of the Smart Grid <br/>9.4.1 Smart Grid Challenges <br/>9.4.2 Smart Grid Layers <br/>9.4.3 Information Security Risks and Demands of Smart Grids<br/>9.4.4 Smart Grid Security Objectives <br/>9.4.5 The Smart Grid System: Three Major Systems <br/>9.4.6 Types of Security Attacks that can Compromise the Smart Grid Security <br/>9.4.7 Cybersecurity Attacks on a Smart Grid<br/>9.5 Security of SCADA Control Systems <br/>9.5.1 Components of SCADA Systems <br/>9.5.2 SCADA System Layers <br/>9.5.3 Requirements and Features for the Security of Control Systems <br/>9.5.4 Categories of Security Threats to Modern SCADA Systems <br/>9.6 Index Security of Wireless Sensor Networks (WSNs) <br/>9.6.1 WSN Layers <br/>9.6.2 Security Requirements in WSNs <br/>9.6.3 WSN Attack Categories <br/>9.6.4 Security Protocols in WSNs <br/>
650 14 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA
Término de materia o nombre geográfico como elemento de entrada Computer security
9 (RLIN) 20921
650 10 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA
Término de materia o nombre geográfico como elemento de entrada Data encryption
9 (RLIN) 34709
650 14 - PUNTO DE ACCESO ADICIONAL DE MATERIA--TÉRMINO DE MATERIA
Término de materia o nombre geográfico como elemento de entrada Computer networks
Subdivisión general Security measures
9 (RLIN) 20788
700 ## - PUNTO DE ACCESO ADICIONAL--NOMBRE DE PERSONA
Nombre de persona Jangra, S.
9 (RLIN) 34710
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA)
Fuente del sistema de clasificación o colocación Dewey Decimal Classification
Tipo de ítem Koha Libro de Reserva
Parte de la signatura que identifica el ejemplar (Parte del ítem) 005.8 C496 2020
Holdings
Disponibilidad Mostrar en OPAC Fuente de clasificación o esquema Programa Tipo de Descarte Restricción de Préstamo Colección Asociada Localización permanente Localización actual Fecha adquisición Forma de Adquisición Precio Préstamos totales Signatura topográfica completa Código de barras Fecha última consulta Ejemplar Propiedades de Préstamo KOHA Nota pública
Disponible Presente - Mostrar en el OPAC Dewey Decimal Classification Ingeniería de Sistemas / Barranquilla Disponible - NO DESCARTADO SI Permitido el Préstamo Reserva Biblioteca William Corredor Gómez. Sede Cosmos (Barranquilla) Biblioteca William Corredor Gómez. Sede Cosmos (Barranquilla) 28/06/2023 Compra 220000.00   005.8 C496 2020 301257615 06/02/2024 Ej. 1 Libro de Reserva Colección 1, Isla 1, Lado B, Módulo 3