Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Digital Privacy - M.L. Shannon

Digital Privacy

A Guide to Computer Security

(Autor)

Buch | Softcover
130 Seiten
1993
Paladin Press,U.S. (Verlag)
978-0-87364-774-8 (ISBN)
CHF 52,75 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Hackers, crackers, passwords, data encryption, Van Eck monitoring, theft prevention--here is the latest inside dope on these and other aspects of modern computer security vital to any business or security organization. Includes no-holds-barred discussions of current security programs, alarms and locks, gadgets and gimmicks, hackers and passwords, E-mail and the law, portable computers and much more.

M.L. Shannon's lifelong interest in communications led him to work as a technician for a company that made surveillance and countermeasures gear as well as for a professional countermeasures company. He is well versed on privacy issues.

Introduction Is the Book Necessary? Not the Last Word Part I DATA ENCRYPTION Do You Need Data Encryption? Why Do You Need PGP? A History of Computers The Tube The Transistor Satellites and Atom Bombs Red Apples, Big Blue, & Green Acres A History of Ciphers What is a Cipher? Types of Ciphers The Vigenere The Verham The Playfair The Bazeries The Enigma The RSA & DES Algorithms RSA Programs MailSafe Iris Pretty Good Privacy The Public Key System How the Public Key System Works The RSA Digital Envelope The RSA Digital Signature Public Key Management The Data Encryption Standard Why 56? How The DES Works Using the DES DES Program How Secure are Encryption Programs? So What Is It? It Ain't Necessarily So A Tale of Terrorists Beware of Snake Oil Breaking The RSA Breaking The DES Speculation Double Encryption The Whitening of the Keys The Key to the Keys Your Own Secret Code Pocket Databases and Race Horses So Who Cares? Espionage! Someone Cares Confusing The Datanappers The Spooks in the Cellar Attack! Trickery Dictionaries RUPA and the Average Bell Boilerplate Data Compression Which Program is Right For Me? DOS, Macintosh or Unix? RSAREF and RIPEM Some Programs Reviewed Dolphin Encrypt Encrypt-It for Windows File Encrypt DES The Iris DES The Iris Public Key Program MailSafe Public Key Program MailSafe Command Line The PGP Public Key Program The Private Lines DES SuperCrypt DES Shakedown The DES Compatibility Test The Speed Test Running Under Windows Cost Encrypting Graphics Files System Requirements No Guarantees Recommendations Encryption & the Law Part II THEFT AND PREVENTION Alarms and Locks Gadgets and Gimmicks Booby Traps, Booby Hatches and Barristers An Inside Job Access Control The Stacker Attacker Defeater Data To Go Portable Computers Part III THE INVASION OF THE DATANAPPERS Neural Networking Computers And Then Along Came Sears Wiretappers and Windmills The van Eck Monitor Monitor How it Works TEMPEST It's Not Just the Monitor Van Eck Frequencies Where to Get Monitor Monitors Commercial Systems Home Made Systems Generating Sync Signals How Well Do These Things Really Work? More Trickery Prevention Van Eck Monitoring & the Law Wiretapping and Data The Cellular Broadcasting Co. Networks and Noses E-mail and the Law Hackers and Passwords The Unix Tripwire The Private Hobby BBS Business Systems An Unbreakable System A Breakable System How the Hack Do I? War Games Dialers Overlord CAMA Traps & Pen Registers What's a Hacker To Do? On The Other End Sick Systems Part IV EVERYTHING ELSE Do You Need Professional Help? The Internet The Hatfields & the McCoys Patent Rights on the Algorithm Risks of Using the PGP Notes Credits Suggested Reading Electronic Magazines Books Computer Crime Cryptography Articles General Super Computers The NIST DSS Big Brother Laces to Get Things Super Computers The DES Fact Sheet How the XOR Works Also From Lysias Press Glossary of Terms

Erscheint lt. Verlag 1.7.1993
Zusatzinfo illustrations
Verlagsort Colorado
Sprache englisch
Maße 216 x 280 mm
Gewicht 481 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-87364-774-2 / 0873647742
ISBN-13 978-0-87364-774-8 / 9780873647748
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20