01051nam 2200349 450 99654033330331620230717135722.0(CKB)5670000000383870(NjHacI)995670000000383870(EXLCZ)99567000000038387020230717d2022 uy 0gerur|||||||||||txtrdacontentcrdamediacrrdacarrierHorizontal integration an administrative science perspective on cross-border cooperation in Europe /Joachim BeckErste auflage.Baden-Baden :Nomos,2022.1 online resource (283 pages) illustrations3-8487-7402-X Includes bibliographical references.Border crossingBorder crossing.320.12Beck Joachim1258500NjHacINjHaclBOOK996540333303316Horizontal integration2916334UNISA01722oam 2200517 a 450 991070327260332120110825142839.0(CKB)3720000000016525(OCoLC)747546816(OCoLC)1154320060(EXLCZ)99372000000001652520110823d2011 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierBudget Control Act of 2011[electronic resource][Library of Congress public edition].[Washington, D.C.] :[U.S. G.P.O.],[2011]1 online resource (28 unnumbered pages)Report / Congressional Research Service ;R41965Title from title screen (viewed on Aug. 23, 2011)."Aug. 2, 2011 (S. 365).""125 Stat. 240.""Public Law 112-25."Report includes bibliographical references.Budget Control Act of 2011BudgetLaw and legislationUnited StatesBudget deficitsUnited StatesGovernment spending policyUnited StatesUnited StatesAppropriations and expendituresBudgetLaw and legislationBudget deficitsGovernment spending policyHeniff Bill1361589Mahan Shannon M.Rybicki ElizabethLibrary of Congress.Congressional Research Service,GPOGPOGPOBOOK9910703272603321Budget Control Act of 20113524321UNINA05653nam 2200781 a 450 991081448200332120200520144314.0978661302725297812830272501283027259978111825579711182557989781118038772111803877097811180387581118038754(CKB)2670000000066987(EBL)706899(SSID)ssj0000470223(PQKBManifestationID)11288855(PQKBTitleCode)TC0000470223(PQKBWorkID)10412206(PQKB)10889187(Au-PeEL)EBL706899(CaPaEBR)ebr10441501(CaONFJC)MIL302725(OCoLC)768230323(CaSebORM)9780470920411(MiAaPQ)EBC706899(OCoLC)780680552(OCoLC)ocn780680552 (Perlego)1011783(EXLCZ)99267000000006698720101202d2011 uy 0engur|n|---|||||txtccrImplementing SSL/TLS using cryptography and PKI /Joshua Davies1st ed.Indianapolis, Ind. Wiley Pub., Inc20111 online resource (697 p.)Description based upon print version of record.9780470920411 0470920416 Implementing SSL/TLS Using Cryptography and PKI; Contents; Introduction; Chapter 1: Understanding Internet Security; What Are Secure Sockets?; "Insecure" Communications: Understanding the HTTP Protocol; Implementing an HTTP Client; Adding Support for HTTP Proxies; Reliable Transmission of Binary Data with Base64 Encoding; Implementing an HTTP Server; Roadmap for the Rest of This Book; Chapter 2: Protecting Against Eavesdroppers with Symmetric Cryptography; Understanding Block Cipher Cryptography Algorithms; Implementing the Data Encryption Standard (DES) Algorithm; DES Initial PermutationDES Key ScheduleDES Expansion Function; DES Decryption; Padding and Chaining in Block Cipher Algorithms; Using the Triple-DES Encryption Algorithm to Increase Key Length; Faster Encryption with the Advanced Encryption Standard (AES) Algorithm; AES Key Schedule Computation; AES Encryption; Other Block Cipher Algorithms; Understanding Stream Cipher Algorithms; Understanding and Implementing the RC4 Algorithm; Converting a Block Cipher to a Stream Cipher: The OFB and COUNTER Block-Chaining Modes; Chapter 3: Secure Key Exchange over an Insecure Medium with Public Key CryptographyUnderstanding the Theory Behind the RSA AlgorithmPerforming Arbitrary Precision Binary Math to Implement Public-Key Cryptography; Implementing Large-Number Addition; Implementing Large-Number Subtraction; Implementing Large-Number Division; Comparing Large Numbers; Optimizing for Modulo Arithmetic; Using Modulus Operations to Efficiently Compute Discrete Logarithms in a Finite Field; Encryption and Decryption with RSA; Encrypting with RSA; Decrypting with RSA; Encrypting a Plaintext Message; Decrypting an RSA-Encrypted Message; Testing RSA Encryption and DecryptionGetting More Security per Key Bit: Elliptic Curve CryptographyHow Elliptic Curve Cryptography Relies on Modular Inversions; Using the Euclidean Algorithm to compute Greatest Common Denominators; Computing Modular Inversions with the Extended Euclidean Algorithm; Adding Negative Number Support to the Huge Number Library; Supporting Negative Remainders; Making ECC Work with Whole Integers: Elliptic-Curve Cryptography over Fp; Reimplementing Diffie-Hellman to Use ECC Primitives; Why Elliptic-Curve Cryptography?; Chapter 4: Authenticating Communications Using Digital SignaturesUsing Message Digests to Create Secure Document SurrogatesImplementing the MD5 Digest Algorithm; Understanding MD5; A Secure Hashing Example; Securely Hashing a Single Block of Data; MD5 Vulnerabilities; Increasing Collision Resistance with the SHA-1 Digest Algorithm; Understanding SHA-1 Block Computation; Understanding the SHA-1 Input Processing Function; Understanding SHA-1 Finalization; Even More Collision Resistance with the SHA-256 Digest Algorithm; Preventing Replay Attacks with the HMAC Keyed-Hash Algorithm; Implementing a Secure HMAC Algorithm; Completing the HMAC OperationCreating Updateable Hash FunctionsHands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: <liComputer networksSecurity measuresWorld Wide WebSecurity measuresComputer network protocolsComputer networksSecurity measures.World Wide WebSecurity measures.Computer network protocols.005.8Davies Joshua Dennis1665821MiAaPQMiAaPQMiAaPQBOOK9910814482003321Implementing SSL4024677UNINA