Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data

دانلود کتاب Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data

44000 تومان موجود

کتاب رمزنگاری مدرن برای متخصصان امنیت سایبری: بیاموزید که چگونه می توانید از رمزگذاری استفاده کنید تا داده های سازمان خود را بهتر تضمین کنید نسخه زبان اصلی

دانلود کتاب رمزنگاری مدرن برای متخصصان امنیت سایبری: بیاموزید که چگونه می توانید از رمزگذاری استفاده کنید تا داده های سازمان خود را بهتر تضمین کنید بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 10


توضیحاتی در مورد کتاب Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data

نام کتاب : Modern Cryptography for Cybersecurity Professionals: Learn how you can leverage encryption to better secure your organization's data
عنوان ترجمه شده به فارسی : رمزنگاری مدرن برای متخصصان امنیت سایبری: بیاموزید که چگونه می توانید از رمزگذاری استفاده کنید تا داده های سازمان خود را بهتر تضمین کنید
سری :
نویسندگان :
ناشر : Packt Publishing
سال نشر : 2021
تعداد صفحات : 286
ISBN (شابک) : 1838644350 , 9781838644352
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 6 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Cover
Title page
Copyright and Credits
Dedication
Contributors
Table of Contents
Preface
Section 1: Securing Our Data
Chapter 1: Protecting Data in Motion or at Rest
Outlining the current threat landscape
Digitally transforming our world
Threatening the security of our data
Understanding security services
Investigating X.800
Introducing common cryptographic concepts
Trusting a TTP
Managing keys using the PKI
Getting to know Bob and Alice
Outlining substitution and transposition
Substituting characters
Transposing the text
Breaking the code
Summary
Questions
Further reading
Chapter 2: The Evolution of Ciphers
Early uses of cryptography
Using tattoos and scytales
Evaluating monoalphabetic ciphers
Recognizing polyalphabetic ciphers
Encoding transmissions during war
Communicating during wartime
Examining the Enigma machine
Entering the digital age
Innovating in the field of computing
Developing the early ciphers
Summary
Questions
Further reading
Chapter 3: Evaluating Network Attacks
Comparing passive and active attacks
Carrying out a passive attack
Launching an active attack
Protecting sensitive data
Understanding attack vectors
Providing defense mechanisms
Maintaining integrity
Protecting assets
Managing risk
Summary
Questions
Further reading
Section 2: Understanding Cryptographic Techniques
Chapter 4: Introducing Symmetric Encryption
Discovering the evolution of symmetric encryption
Protecting customer data
Developing the Feistel cipher
Creating the Lucifer cipher
Outlining symmetric algorithms
Understanding symmetric encryption
Describing the Data Encryption Standard
Illustrating the Advanced Encryption Standard
Identifying other symmetric algorithms
Scheduling the keys
Dissecting block and stream ciphers
Using a block cipher
Generating a stream
Comparing symmetric encryption operation modes
Using ECB
Adding feedback
Applying CTR mode
Securing wireless communications
Preventing eavesdropping
Comparing protocols
Summary
Questions
Further reading
Chapter 5: Dissecting Asymmetric Encryption
Realizing the need for asymmetric encryption
Securely exchanging a key
Outlining the PKCS
Understanding cryptographic requirements
Designing a strong algorithm
Generating a key pair
Managing keys
Using asymmetric encryption
Comparing public-key algorithms
Outlining RSA
Visualizing an elliptical curve
Providing PGP
Trusting public keys
Working with digital signatures
Providing core security services
Creating a digital signature
Summary
Questions
Further reading
Chapter 6: Examining Hash Algorithms
Describing a hash algorithm
Creating a hash
Employing a hash function
Identifying optimal hash properties
Generating a one-way function
Producing a fixed-size output
Consistently creating the same hash
Ensuring collision resistance
Comparing common hash algorithms
Using the message digest algorithm
Exploring the Secure Hash Algorithm (SHA)
Recognizing other hash algorithms
Authenticating a message
Creating a MAC
Encrypting and authenticating data
Summary
Questions
Further reading
Section 3: Applying Cryptography in Today\'s World
Chapter 7: Adhering to Standards
Understanding FIPS and PCI DSS
Outlining FIPS
Outlining PCI DSS
Staying compliant
Ensuring the privacy of patient data
Giving consumers control of their data
Enforcing protection in California
Leveraging encrypted data
Securing our data
Concealing malware
Holding files ransom
Exposing private information
Summary
Questions
Further reading
Chapter 8: Using a Public Key Infrastructure
Describing a PKI framework
Understanding how a PKI assures trust
Exchanging the keys
Understanding the components
Storing certificates
Revoking a certificate
Managing public keys
Creating a certificate
Trusting the root
Spoofing the process
Examining a certificate
Viewing a certificate
Recognizing the X.509 standard
Validating a certificate
Using certificates
Summary
Questions
Further reading
Chapter 9: Exploring IPsec and TLS
Using a VPN
Securing traffic using OpenVPN
Choosing a browser-based VPN
Using an SSH VPN
Using a VPN on a Windows machine
Outlining an IPsec VPN
Grasping the IPsec framework
Dissecting the AH protocol
Encapsulating the security payloads
Using operating modes
Generating a shared secret key with DH
Managing the keys using IKE
Setting up an IPsec profile
Understanding TLS
Understanding the handshake protocols
Dissecting the Record protocol
Summary
Questions
Further reading
Chapter 10: Protecting Cryptographic Techniques
Recognizing cryptographic attacks
Comparing various attacks
Using Kali Linux
Cracking WEP
Attacking the infrastructure
Guaranteeing trust
Violating trust
Influence of quantum computing
Describing quantum computing
Implementing quantum-resistant algorithms
Summary
Questions
Further reading
Assessments
About Packt
Other Books You May Enjoy
Index




پست ها تصادفی