Showing 3,981 - 4,000 results of 4,000 for search '"United States Department of Defense"', query time: 0.23s Refine Results
  1. 3981
  2. 3982
  3. 3983
  4. 3984
  5. 3985
  6. 3986
  7. 3987
  8. 3988
  9. 3989
  10. 3990
  11. 3991
  12. 3992
  13. 3993
  14. 3994
  15. 3995
    Published 2003
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  16. 3996
  17. 3997
  18. 3998
  19. 3999
  20. 4000
    by Sampaio de Alencar, Marcelo
    Published 2022
    Table of Contents: “…Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35 2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1, and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change, Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186 9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackerś⁰₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home DepotС́⁰₉s System 208 12.3.5 Largest Theft of Customer Data 208 12.3.6 Yahoo Data Breach 209 12.3.7 CustomerС́⁰₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal, and Netflix 211 12.3.14 MafiaBoyС́⁰₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 BayesС́⁰₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function 228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295.…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook