LEADER 00866nam0-22002891i-450- 001 990006312040403321 005 19980601 035 $a000631204 035 $aFED01000631204 035 $a(Aleph)000631204FED01 035 $a000631204 100 $a19980601d1967----km-y0itay50------ba 105 $a--------00-yy 200 1 $aDerecho cooperativo$ecolleccion Tesis de Doctorado$fJaime R. Daly Guevara. 210 $aCaracas$cFacultad de derecho$d1967 215 $a426 p.$d24 cm 225 1 $a"Universidad Central de Venezuela. Facultad de derecho. Tesis de doctorado...$v7 676 $a344 700 1$aDaly Guevara,$bJaime R.$0237882 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006312040403321 952 $aUNIV. 347 (7)$b86849$fFGBC 959 $aFGBC 996 $aDerecho cooperativo$9641666 997 $aUNINA DB $aGIU01 LEADER 05537nam 2200661 a 450 001 9910831028903321 005 20170809163101.0 010 $a1-281-83706-7 010 $a9786611837068 010 $a0-470-42549-0 010 $a0-470-42547-4 035 $a(CKB)1000000000556087 035 $a(EBL)362133 035 $a(SSID)ssj0000168900 035 $a(PQKBManifestationID)11183841 035 $a(PQKBTitleCode)TC0000168900 035 $a(PQKBWorkID)10191856 035 $a(PQKB)10454273 035 $a(MiAaPQ)EBC362133 035 $a(CaSebORM)9780470193396 035 $a(OCoLC)264703219 035 $a(EXLCZ)991000000000556087 100 $a20080424d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHardware-based computer security techniques to defeat hackers$b[electronic resource] $efrom biometrics to quantum cryptography /$fRoger Dube 210 $aHoboken, N.J. $cWiley$dc2008 215 $a1 online resource (254 p.) 300 $aDescription based upon print version of record. 311 $a0-470-19339-5 320 $aIncludes bibliographical references and index. 327 $aHardware-Based Computer Security Techniques to Defeat Hackers; CONTENTS; 1 THE ELEMENTS OF COMPUTER SECURITY; Cryptography; Symmetric Key Cryptography; Asymmetric Key Cryptography; Passwords and Keys; Password/Key Strength; Password/Key Storage and Theft; Passwords and Authentication; Something You Know; Something You Have; Something You Are; Random-Number Generators; Pseudo-Random-Number Generators (PRGs); Hardware-Based Random-Number Generators; Hybrid Hardware/Software Random-Number Generators; Key Generation; Security and the Internet; References; 2 CRYPTOGRAPHY APPROACHES AND ATTACKS 327 $aSymmetric Key CryptographyOne-Time Pad; DES and Triple DES; International Data-Encryption Algorithm; Rivest Cipher 4; Blowfish; Advanced Encryption Standard; Quantum Cryptography; Hash Algorithms; The Birthday Paradox and Hash Algorithms; References; 3 KEY GENERATION AND DISTRIBUTION APPROACHES AND ATTACKS; Key Generation; Software Key Generation; Hardware Key Generation; Noise-Based Approaches; Noisy Diodes and Resistors; Radio-Frequency Sources; Brownian-Motion Devices; Quantum Devices; Nuclear Decay Devices; Optical Devices; Other Hardware Sources of Randomness; Key Distribution 327 $aKey Distribution for Software-Based PRGsKey Distribution; Key Storage; Key Use; Key Distribution for Hardware-Based RNGs; Creation of RNGs; Initialization of RNGs; Distribution of RNGs; Key Storage and Use; Minimizing Hardware Attack Risks; References; 4 THE QUALITIES OF WORKABLE SECURITY SOLUTIONS; Secure Coprocessors; Attack Vectors; Techniques for Creating Strong Coprocessors; Secure Bootstrap Loading; Protection of the Bootstrap Process; Secure Memory Management; Protection of Memory Management; Trusted Platform Module; TPM Attack Vectors; LaGrande (Trusted Execution Technology) 327 $aVideo ProtectionInput Devices; Memory Protection; Trusted Execution Technology Attack Vectors; Field-Programmable Gate Array; Hardware-Based Authentication; Person Authentication Using Biometrics; Fingerprint Scanners; Voiceprints; Iris Scans; Palm Prints; Radio-Frequency IDs; Hardware Based RNGs; Hardware Token Authenticators; References; 5 SECURE COPROCESSORS; The Need for Secure Coprocessors; Physical Security; Initialization; Usability Accessibility and Security; Support and Upgrades; Anticipatory Design; Authentication; References; 6 SECURE BOOTSTRAP LOADING 327 $aThe Need for Secure Bootstrap LoadingImplementation; Hardware Firmware and Software; The Trusted Computing Base; Concluding Remarks; The Benefits of Secure Bootstrapping; References; 7 SECURE MEMORY MANAGEMENT AND TRUSTED EXECUTION TECHNOLOGY; The Need for Secure Memory Management; Buffer Overflows; Memory Pointer Attacks; The Impact of Memory-Management Attacks; Minimizing Memory-Management Attacks; Platform-Design Considerations; Trusted Execution Technology; Protected Execution; Protected Storage; Protected Input; Protected Graphics; Environment Authentication and Protected Launch 327 $aDomain Manager 330 $aPresents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeat-and prevent-attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers 606 $aComputer security$xEquipment and supplies 606 $aComputer security$xComputer programs 606 $aComputer input-output equipment 606 $aComputer crimes$xPrevention 615 0$aComputer security$xEquipment and supplies. 615 0$aComputer security$xComputer programs. 615 0$aComputer input-output equipment. 615 0$aComputer crimes$xPrevention. 676 $a005.8 700 $aDube$b Roger$01628617 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910831028903321 996 $aHardware-based computer security techniques to defeat hackers$93965828 997 $aUNINA