|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Quantum cryptography (or quantum key distribution) is a
state-of-the-art technique that exploits properties of quantum
mechanics to guarantee the secure exchange of secret keys. This
self-contained text introduces the principles and techniques of
quantum cryptography, setting it in the wider context of
cryptography and security, with specific focus on secret-key
distillation. The book starts with an overview chapter, progressing
to classical cryptography, information theory (classical and
quantum), and applications of quantum cryptography. The discussion
moves to secret-key distillation, privacy amplification and
reconciliation techniques, concluding with the security principles
of quantum cryptography. The author explains the physical
implementation and security of these systems, enabling engineers to
gauge the suitability of quantum cryptography for securing
transmission in their particular application. With its blend of
fundamental theory, implementation techniques, and details of
recent protocols, this book will be of interest to graduate
students, researchers, and practitioners in electrical engineering,
physics, and computer science.
Personal data security breaches are being reported with increasing
regularity. Within the past few years, numerous examples of data
such as Social Security, bank account, credit card, and driver's
license numbers, as well as medical and student records have been
compromised. A major reason for the increased awareness of these
security breaches is a California law that requires notice of
security breaches to the affected individuals. This law,
implemented in July 2003, was the first of its kind in the nation.
State data security breach notification laws require companies and
other entities that have lost data to notify affected consumers. As
of January 2007, 35 states have enacted legislation requiring
companies or state agencies to disclose security breaches involving
personal information. Congress is considering legislation to
address personal data security breaches, following a series of
high-profile data security breaches at major financial services
firms, data brokers (including ChoicePoint and LexisNexis), and
universities. In the past three years, multiple measures have been
introduced, but to date, none have been enacted.
Implement bulletproof Cisco security the battle-tested "Hacking
Exposed" way. .
Defend against the sneakiest attacks by looking at your Cisco
network and devices through the eyes of the intruder. "Hacking
Exposed Cisco Networks" shows you, step-by-step, how hackers target
exposed systems, gain access, and pilfer compromised networks. All
device-specific and network-centered security issues are covered
alongside real-world examples, in-depth case studies, and detailed
countermeasures. Its all here--from switch, router, firewall,
wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle,
VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows
catastrophe by learning how new flaws in Cisco-centered networks
are discovered and abused by cyber-criminals. Plus, youll get
undocumented Cisco commands, security evaluation templates, and
vital security tools from hackingexposedcisco.com.. . . Use the
tried-and-true "Hacking Exposed" methodology to find, exploit, and
plug security holes in Cisco devices and networks. Locate
vulnerable Cisco networks using Google and BGP queries, wardialing,
fuzzing, host fingerprinting, and portscanning. Abuse Cisco
failover protocols, punch holes in firewalls, and break into VPN
tunnels . Use blackbox testing to uncover data input validation
errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain
network access using password and SNMP community guessing, Telnet
session hijacking, and searching for open TFTP servers. Find out
how IOS exploits are written and if a Cisco router can be used as
an attack platform. Block determined DoS and DDoS attacks using
Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys
cracking, sneakydata link attacks, routing protocol exploits, and
malicious physical access. . . .
From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.
Mission critical real-time systems often function in environments
that cannot be modelled with static approaches. Because of their
(externally-driven) wide dynamic range of system operation, the
number of data elements to be processed in an arbitrary period is
unknown at the time of system engineering (other than an extremely
pessimistic worst case sense). While it may be possible to
determine a theoretical upper bound on the number of data items,
the construction and maintenance of system components to handle
worst-case conditions can be prohibitively costly. To accommodate
such dynamic mission critical real-time systems, it is useful to
design computing systems that allow reconfiguration and
reallocation of resources by sharing a pool of distributed
computational resources. Unfortunately, the problem of continuously
providing critical system functions in such dynamic real-time
environments is exacerbated when one considers attack
vulnerability. The Internet has made mission critical real-time
computer systems subject to an ever-changing array of attacks for
which current defence mechanisms are insufficient. In order to
combat intruders in this new environment, new techniques must be
developed that enable decision makers to detect unusual behaviour
in their systems, correlate anomalies into higher-level attacker
goals, plan appropriate response actions, and execute their plans.
This special book presents current work in this general area of
real-time system security.
We live in a wired society, with computers containing and passing
around vital information on both personal and public matters.
Keeping this data safe is of paramount concern to all. Yet, not a
day seems able to pass without some new threat to our computers.
Unfortunately, the march of technology has given us the benefits of
computers and electronic tools, while also opening us to unforeseen
dangers. Identity theft, electronic spying, and the like are now
standard worries. In the effort to defend both personal privacy and
crucial databases, computer security has become a key industry. A
vast array of companies devoted to defending computers from hackers
and viruses have cropped up. Research and academic institutions
devote a considerable amount of time and effort to the study of
information systems and computer security. Anyone with access to a
computer needs to be aware of the developing trends and growth of
computer security. To that end, this book presents a comprehensive
and carefully selected bibliography of the literature most relevant
to understanding computer security. Following the bibliography
section, continued access is provided via author, title, and
subject indexes. With such a format, this book serves as an
important guide and reference tool in the defence of our
computerised culture.
Stefan Brands proposes cryptographic building blocks for the design
of digital certificates that preserve privacy without sacrificing
security. As paper-based communication and transaction mechanisms
are replaced by automated ones, traditional forms of security such
as photographs and handwritten signatures are becoming outdated.
Most security experts believe that digital certificates offer the
best technology for safeguarding electronic communications. They
are already widely used for authenticating and encrypting email and
software, and eventually will be built into any device or piece of
software that must be able to communicate securely. There is a
serious problem, however, with this unavoidable trend: unless
drastic measures are taken, everyone will be forced to communicate
via what will be the most pervasive electronic surveillance tool
ever built. There will also be abundant opportunity for misuse of
digital certificates by hackers, unscrupulous employees, government
agencies, financial institutions, insurance companies, and so on.In
this book Stefan Brands proposes cryptographic building blocks for
the design of digital certificates that preserve privacy without
sacrificing security. Such certificates function in much the same
way as cinema tickets or subway tokens: anyone can establish their
validity and the data they specify, but no more than that.
Furthermore, different actions by the same person cannot be linked.
Certificate holders have control over what information is
disclosed, and to whom. Subsets of the proposed cryptographic
building blocks can be used in combination, allowing a cookbook
approach to the design of public key infrastructures. Potential
applications include electronic cash, electronic postage, digital
rights management, pseudonyms for online chat rooms, health care
information storage, electronic voting, and even electronic
gambling.
Since the collapse of the Soviet Union, the United States has faced
the challenge of reorienting its foreign policy to address
post-Cold War conditions. In this new edition of a groundbreaking
work -- one of the first to bring critical theory into dialogue
with more traditional approaches to international relations --
David Campbell provides a fundamental reappraisal of American
foreign policy, with a new epilogue to address current world
affairs and the burgeoning focus on culture and identity in the
study of international relations.
Extending recent debates in international relations, Campbell
shows how perceptions of danger and difference work to establish
the identity of the United States. He demonstrates how foreign
policy, far from being an expression of a given society,
constitutes state identity through the interpretation of danger
posed by others.
|
You may like...
CMOS Cookbook
Don Lancaster, Howard M. Berlin
Paperback
R1,072
Discovery Miles 10 720
|