Information Security. Mark StampЧитать онлайн книгу.
of Authorization 7.3 Access Control Matrix 7.4 Multilevel Security Models 7.5 Covert Channels 7.6 Inference Control 7.7 CAPTCHA 7.8 Summary 7.9 Problems Notes
11 Part III: Topics in Network Security Chapter 8: Network Security Basics 8.1 Introduction 8.2 Networking Basics 8.3 Cross‐Site Scripting Attacks 8.4 Firewalls 8.5 Intrusion Detection Systems 8.6 Summary 8.7 Problems Notes Chapter 9: Simple Authentication Protocols 9.1 Introduction 9.2 Simple Security Protocols 9.3 Authentication Protocols 9.4 “Authentication” and TCP 9.5 Zero Knowledge Proofs 9.6 Tips for Analyzing Protocols 9.7 Summary 9.8 Problems Notes Chapter 10: Real‐World Security Protocols 10.1 Introduction 10.2 SSH 10.3 SSL 10.4 IPsec 10.5 Kerberos 10.6 WEP 10.7 GSM 10.8 Summary 10.9 Problems Notes
12 Part IV: Software Chapter 11: Software Flaws and Malware 11.1 Introduction 11.2 Software Flaws 11.3 Malware 11.4 Miscellaneous Software‐Based Attacks 11.5 Summary 11.6 Problems Notes Chapter 12: Insecurity in Software 12.1 Introduction 12.2 Software Reverse Engineering 12.3 Software Development 12.4 Summary 12.5 Problems Notes
13 Appendix A‐1 Modular Arithmetic A‐2 Permutations A‐3 Probability A‐4 DES Permutations
14 Bibliography
15 Index
List of Tables
1 Chapter 2Table 2.1 Abbreviated alphabetTable 2.2 Election of 1876 codebookTable 2.3 Excerpt from a German codebookTable 2.4VENONA decrypt of message of 21 September 1944
2 Chapter 3Table 3.1 RC4 initializationTable 3.2 RC4 keystream byteTable 3.3 DES S‐box 1 (in hexadecimal)Table 3.4 DES key schedule algorithmTable 3.5 AES ByteSub
Table 3.6 TEA encryptionTable 3.7 TEA decryption
3 Chapter 4Table 4.1 Addition on an elliptic curve
4 Chapter 5Table 5.1 Steps in round
of SHA‐3Table 5.2 Simple steganography example5 Chapter 6Table 6.1 Iris scan distance and fraud rateTable 6.2 Biometric equal error rates [121]
6 Chapter