語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Guide to Internet Cryptography = Security Protocols and Real-World Attack Implications /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Guide to Internet Cryptography/ by Jörg Schwenk.
其他題名:
Security Protocols and Real-World Attack Implications /
作者:
Schwenk, Jörg.
面頁冊數:
XIX, 530 p. 272 illus., 80 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Security Services. -
電子資源:
https://doi.org/10.1007/978-3-031-19439-9
ISBN:
9783031194399
Guide to Internet Cryptography = Security Protocols and Real-World Attack Implications /
Schwenk, Jörg.
Guide to Internet Cryptography
Security Protocols and Real-World Attack Implications /[electronic resource] :by Jörg Schwenk. - 1st ed. 2022. - XIX, 530 p. 272 illus., 80 illus. in color.online resource. - Information Security and Cryptography,2197-845X. - Information Security and Cryptography,.
Introduction -- The Internet -- Cryptography: Confidentiality -- Cryptography: Integrity and Authenticity -- Cryptographic Protocols -- Point-to-Point Security -- Wireless LAN (WLAN) -- Cellular Networks -- IP Security (IPsec) -- Security of HTTP -- Transport Layer Security -- A Short History of TLS -- Attacks on SSL and TLS -- Secure Shell (SSH) -- Kerberos -- DNS Security -- File Encryption: PGP -- Email Security: S/MIME -- Attacks on S/MIME and OpenPGP -- Email: Protocols and SPAM -- Web Security and Single Sign-On Protocols -- Cryptographic Data Formats -- Index.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions. Topics and features: · Covers the essential standards in Internet cryptography · Integrates work exercises and problems in each chapter · Focuses especially on IPsec, secure e-mail and TLS · Summarizes real-world cryptography in three introductory chapters · Includes necessary background from computer networks · Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes · Provides additional background on web security in two concluding chapters Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise. Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
ISBN: 9783031194399
Standard No.: 10.1007/978-3-031-19439-9doiSubjects--Topical Terms:
1211616
Security Services.
LC Class. No.: QA268
Dewey Class. No.: 005.824
Guide to Internet Cryptography = Security Protocols and Real-World Attack Implications /
LDR
:03986nam a22004335i 4500
001
1085891
003
DE-He213
005
20221125062145.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031194399
$9
978-3-031-19439-9
024
7
$a
10.1007/978-3-031-19439-9
$2
doi
035
$a
978-3-031-19439-9
050
4
$a
QA268
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
100
1
$a
Schwenk, Jörg.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1265055
245
1 0
$a
Guide to Internet Cryptography
$h
[electronic resource] :
$b
Security Protocols and Real-World Attack Implications /
$c
by Jörg Schwenk.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XIX, 530 p. 272 illus., 80 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Information Security and Cryptography,
$x
2197-845X
505
0
$a
Introduction -- The Internet -- Cryptography: Confidentiality -- Cryptography: Integrity and Authenticity -- Cryptographic Protocols -- Point-to-Point Security -- Wireless LAN (WLAN) -- Cellular Networks -- IP Security (IPsec) -- Security of HTTP -- Transport Layer Security -- A Short History of TLS -- Attacks on SSL and TLS -- Secure Shell (SSH) -- Kerberos -- DNS Security -- File Encryption: PGP -- Email Security: S/MIME -- Attacks on S/MIME and OpenPGP -- Email: Protocols and SPAM -- Web Security and Single Sign-On Protocols -- Cryptographic Data Formats -- Index.
520
$a
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions. Topics and features: · Covers the essential standards in Internet cryptography · Integrates work exercises and problems in each chapter · Focuses especially on IPsec, secure e-mail and TLS · Summarizes real-world cryptography in three introductory chapters · Includes necessary background from computer networks · Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes · Provides additional background on web security in two concluding chapters Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise. Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
650
2 4
$a
Security Services.
$3
1211616
650
2 4
$a
Data and Information Security.
$3
1365785
650
1 4
$a
Cryptology.
$3
1211076
650
0
$a
Data protection.
$3
557764
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Cryptography.
$3
567927
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031194382
776
0 8
$i
Printed edition:
$z
9783031194405
776
0 8
$i
Printed edition:
$z
9783031194412
830
0
$a
Information Security and Cryptography,
$x
1619-7100
$3
1263985
856
4 0
$u
https://doi.org/10.1007/978-3-031-19439-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入