![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Implement bulletproof Cisco security the battle-tested "Hacking Exposed" way. . Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. "Hacking Exposed Cisco Networks" shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, youll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.. . . Use the tried-and-true "Hacking Exposed" methodology to find, exploit, and plug security holes in Cisco devices and networks. Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning. Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels . Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers. Find out how IOS exploits are written and if a Cisco router can be used as an attack platform. Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys cracking, sneakydata link attacks, routing protocol exploits, and malicious physical access. . . .
A case-based approach to cryptanalysis that explains how and why attacks can happen Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study. The text is organized around four major themes: Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba. Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL). Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5. Public Key Crypto includes an overview of several public key cryptosystems including theknapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail. Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications. Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation. Cryptography has evolved over the years from Julius Cesar's cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.
The term 'spyware' is not well defined. Generally it is used to refer to any software that is downloaded onto a person's computer without their knowledge. Spyware may collect information about a computer user's activities and transmit that information to someone else. It may change computer settings, or cause 'pop-up' advertisements to appear (in that context, it is called 'adware'). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user's home page. A type of spyware called 'keylogging' software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorised recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker 'spyware' when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realise that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is. This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.
From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.
The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the Directive could create enormous obstacles to commerce between Europe and other countries, such as the United States, that do not have comprehensive privacy statutes. In this book, Peter Swire and Robert Litan provide the first detailed analysis of the sector-by-sector effects of the Directive. They examine such topics as the text of the Directive, the tension between privacy laws and modern information technologies, issues affecting a wide range of businesses and other organizations, effects on the financial services sector, and effects on other prominent sectors with large transborder data flows. In light of the many and significant effects of the Directive as written, the book concludes with detailed policy recommendations on how to avoid a coming trade war with Europe. The book will be of interest to the wide range of individuals and organizations affected by the important new European privacy laws. More generally, the privacy clash discussed in the book will prove a major precedent for how electronic commerce and world data flows will be governed in the Internet Age.
Maintaining the high standards of prior editions, Security Analysis puts at your fingertips the authoritative guidance on analyzing securities that generations of investment bankers have come to rely on.
In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.
Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cyber security. This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.
Providing the perfect blend of basic security theory and practical software security programming, Software Security Technologies: A Programmatic Approach offers a valuable introduction to the field of software security. Divided into three parts, this comprehensive guide encourages readers to master their security skills by building on the basics. The first section of the book is devoted to fundamental security theories that govern common software security technical issues. Coverage then progresses to a focus on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Using these theories and programming practices as a foundation, the book concludes with a section on security in practice, demonstrating how the conceptual and practical materials covered in the first two sections are applied in real-world scenarios. All of these topics are explained using a straightforward approach, so that readers can grasp the information quickly and easily, gaining the confidence they need to further develop their skills in software security technologies.
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance. |
You may like...
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, …
Hardcover
R6,170
Discovery Miles 61 700
Distributed Denial of Service Attacks…
Rajeev Singh, Mangey Ram
Hardcover
R4,457
Discovery Miles 44 570
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, …
Hardcover
R5,077
Discovery Miles 50 770
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, …
Hardcover
R6,170
Discovery Miles 61 700
|