A partir de cette page vous pouvez :
Retourner au premier écran avec les catégories... |
Catégories
Affiner la recherche
Hacking / Erickson Jon
Titre : Hacking : the art of exploitation Type de document : texte imprimé Auteurs : Erickson Jon, Auteur Mention d'édition : 2nd ed Editeur : San Francisco, Calif. Année de publication : 2008 Importance : x, 472 pages Présentation : illustrations Format : 23cm ISBN/ISSN/EAN : 978-1-593-27144-2 Langues : Anglais (eng) Catégories : 005.8 Data security Mots-clés : Hacking Index. décimale : 005.8 Résumé : Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. Hacking [texte imprimé] : the art of exploitation / Erickson Jon, Auteur . - 2nd ed . - [S.l.] : San Francisco, Calif., 2008 . - x, 472 pages : illustrations ; 23cm.
ISBN : 978-1-593-27144-2
Langues : Anglais (eng)
Catégories : 005.8 Data security Mots-clés : Hacking Index. décimale : 005.8 Résumé : Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Rather than merely showing how to run existing exploits, Hacking: The Art of Exploitation, 2nd Edition author Jon Erickson explains how arcane hacking techniques actually work. Using the included Ubuntu LiveCD, get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. Exemplaires
Code-barres Cote Support Localisation Section Disponibilité 125018 005.8 JON Livre Library Repository Exclu du prêt Network security / Radia Perlman
Titre : Network security Type de document : texte imprimé Auteurs : Radia Perlman, Auteur Mention d'édition : Third edition Editeur : Pearson Education, Inc Année de publication : 2023 Importance : xx, 455, G15, M26, B14, I10 pages Présentation : illustrations Format : 24 cm ISBN/ISSN/EAN : 978-0-13-664360-9 Langues : Anglais (eng) Catégories : 005.8 Data security Mots-clés : Network security Index. décimale : 005.8 Résumé : Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) Network security [texte imprimé] / Radia Perlman, Auteur . - Third edition . - [S.l.] : Pearson Education, Inc, 2023 . - xx, 455, G15, M26, B14, I10 pages : illustrations ; 24 cm.
ISBN : 978-0-13-664360-9
Langues : Anglais (eng)
Catégories : 005.8 Data security Mots-clés : Network security Index. décimale : 005.8 Résumé : Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation) Exemplaires
Code-barres Cote Support Localisation Section Disponibilité 125082 005.8 PER Livre Library Repository Exclu du prêt