La lecture à portée de main
Vous pourrez modifier la taille du texte de cet ouvrage
Découvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDécouvre YouScribe en t'inscrivant gratuitement
Je m'inscrisVous pourrez modifier la taille du texte de cet ouvrage
Description
It contains 151 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the information you need--fast! This all-embracing guide offers a thorough view of key knowledge and detailed insight. This Guide introduces what you want to know about secret key.
A quick look inside of some of the subjects covered: CAVE-based authentication - CAVE (Cellular Authentication and Voice Encryption), HTTPS, Symmetric-key cryptography, Keystroke logging - Hardware-based keyloggers, ARC4 - Roos' biases and key reconstruction from permutation, Identity based encryption, Asymmetric key algorithm - Understanding, OpenVPN - Authentication, Trusted timestamping - Classification, Known-plaintext attack, Kerberos (protocol) - Client Service Authorization, Cryptology - Public-key cryptography, Dynamic DNS - Function, BEAST (computer security), Public-key cryptography - How it works, Symmetric encryption, Public key infrastructure - Usage examples, Key distribution in wireless sensor networks - Key distribution schemes, Cryptanalysis - Partial breaks, Public key - How it works, SipHash - Overview, Google Authenticator - Technical description, SSL encryption, Security token - Vulnerabilities, Mix network - Message format, Cryptology - Symmetric-key cryptography, IEEE 802.11i-2004 - The Four-Way Handshake, and much more…
Sujets
Informations
Publié par | Emereo Publishing |
Date de parution | 30 octobre 2014 |
Nombre de lectures | 0 |
EAN13 | 9781488816321 |
Langue | English |
Informations légales : prix de location à la page 0,1250€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.
Extrait