LEADER 05287nam 2200649Ia 450 001 9910139648303321 005 20200410164810.0 010 $a1-283-13887-5 010 $a9786613138873 010 $a1-118-02796-5 010 $a1-118-02797-3 010 $a1-118-02795-7 035 $a(CKB)2550000000037133 035 $a(EBL)738753 035 $a(OCoLC)748365383 035 $a(SSID)ssj0000523419 035 $a(PQKBManifestationID)11322374 035 $a(PQKBTitleCode)TC0000523419 035 $a(PQKBWorkID)10540266 035 $a(PQKB)11141838 035 $a(MiAaPQ)EBC738753 035 $a(EXLCZ)992550000000037133 100 $a20101020d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation security$b[electronic resource] $eprinciples and practice /$fMark Stamp 205 $a2nd ed. 210 $aHoboken, NJ $cWiley$dc2011 215 $a1 online resource (608 p.) 300 $aDescription based upon print version of record. 311 $a0-470-62639-9 320 $aIncludes bibliographical references (p. 531-571) and index. 327 $aInformation Security: Principles and Practice; Contents; Preface; About The Author; Acknowledgments; 1 Introduction; 1.1 The Cast of Characters; 1.2 Alice's Online Bank; 1.2.1 Confidentiality, Integrity, and Availability; 1.2.2 Beyond CIA; 1.3 About This Book; 1.3.1 Cryptography; 1.3.2 Access Control; 1.3.3 Protocols; 1.3.4 Software; 1.4 The People Problem; 1.5 Principles and Practice; 1.6 Problems; I Crypto; 2 Crypto Basics; 2.1 Introduction; 2.2 How to Speak Crypto; 2.3 Classic Crypto; 2.3.1 Simple Substitution Cipher; 2.3.2 Cryptanalysis of a Simple Substitution; 2.3.3 Definition of Secure 327 $a2.3.4 Double Transposition Cipher2.3.5 One-Time Pad; 2.3.6 Project VENONA; 2.3.7 Codebook Cipher; 2.3.8 Ciphers of the Election of 1876; 2.4 Modern Crypto History; 2.5 A Taxonomy of Cryptography; 2.6 A Taxonomy of Cryptanalysis; 2.7 Summary; 2.8 Problems; 3 Symmetric Key Crypto; 3.1 Introduction; 3.2 Stream Ciphers; 3.2.1 A5/1; 3.2.2 RC4; 3.3 Block Ciphers; 3.3.1 Feistel Cipher; 3.3.2 DES; 3.3.3 Triple DES; 3.3.4 AES; 3.3.5 Three More Block Ciphers; 3.3.6 TEA; 3.3.7 Block Cipher Modes; 3.4 Integrity; 3.5 Summary; 3.6 Problems; 4 Public Key Crypto; 4.1 Introduction; 4.2 Knapsack; 4.3 RSA 327 $a4.3.1 Textbook RSA Example4.3.2 Repeated Squaring; 4.3.3 Speeding Up RSA; 4.4 Diffie-Hellman; 4.5 Elliptic Curve Cryptography; 4.5.1 Elliptic Curve Math; 4.5.2 ECC Diffie-Hellman; 4.5.3 Realistic Elliptic Curve Example; 4.6 Public Key Notation; 4.7 Uses for Public Key Crypto; 4.7.1 Confidentiality in the Real World; 4.7.2 Signatures and Non-repudiation; 4.7.3 Confidentiality and Non-repudiation; 4.8 Public Key Infrastructure; 4.9 Summary; 4.10 Problems; 5 Hash Functions++; 5.1 Introduction; 5.2 What is a Cryptographic Hash Function?; 5.3 The Birthday Problem; 5.4 A Birthday Attack 327 $a5.5 Non-Cryptographic Hashes5.6 Tiger Hash; 5.7 HMAC; 5.8 Uses for Hash Functions; 5.8.1 Online Bids; 5.8.2 Spam Reduction; 5.9 Miscellaneous Crypto-Related Topics; 5.9.1 Secret Sharing; 5.9.2 Random Numbers; 5.9.3 Information Hiding; 5.10 Summary; 5.11 Problems; 6 Advanced Cryptanalysis; 6.1 Introduction; 6.2 Enigma; 6.2.1 Enigma Cipher Machine; 6.2.2 Enigma Keyspace; 6.2.3 Rotors; 6.2.4 Enigma Attack; 6.3 RC4 as Used in WEP; 6.3.1 RC4 Algorithm; 6.3.2 RC4 Cryptanalytic Attack; 6.3.3 Preventing Attacks on RC4; 6.4 Linear and Differential Cryptanalysis; 6.4.1 Quick Review of DES 327 $a6.4.2 Overview of Differential Cryptanalysis6.4.3 Overview of Linear Cryptanalysis; 6.4.4 Tiny DES; 6.4.5 Differential Cryptanalysis of TDES; 6.4.6 Linear Cryptanalysis of TDES; 6.4.7 Implications Block Cipher Design; 6.5 Lattice Reduction and the Knapsack; 6.6 RSA Timing Attacks; 6.6.1 A Simple Timing Attack; 6.6.2 Kocher's Timing Attack; 6.7 Summary; 6.8 Problems; II Access Control; 7 Authentication; 7.1 Introduction; 7.2 Authentication Methods; 7.3 Passwords; 7.3.1 Keys Versus Passwords; 7.3.2 Choosing Passwords; 7.3.3 Attacking Systems via Passwords; 7.3.4 Password Verification 327 $a7.3.5 Math of Password Cracking 330 $aNow updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract 606 $aComputer security 606 $aData protection 608 $aElectronic books. 615 0$aComputer security. 615 0$aData protection. 676 $a005.8 686 $aCOM053000$2bisacsh 700 $aStamp$b Mark$0845504 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910139648303321 996 $aInformation security$91931784 997 $aUNINA LEADER 03262nam 2200505 450 001 9910734332603321 005 20230726160922.0 010 $a1-009-40153-X 024 7 $a10.1017/9781009401531 035 $a(CKB)27558695300041 035 $a(UkCbUP)CR9781009401531 035 $a(NjHacI)9927558695300041 035 $a(EXLCZ)9927558695300041 100 $a20230622e20232008 fy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 181 $csti$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aParticle detectors$b[electronic resource] 205 $aSecond edition /$bClaus Grupen, Boris Shwartz ; with contributions from Helmuth Spieler, Simon Eidelman, Tilo Stroh. 210 1$aCambridge :$cCambridge University Press,$d2023. 215 $a1 online resource (xxiii, 651 pages) $cillustrations (black and white), digital, PDF file(s) 225 1 $aCambridge monographs on particle physics, nuclear physics and cosmology ;$v26 300 $aThis edition previously issued in print: 2008. 311 $a9781009401494 320 $aIncludes bibliographical references and index. 327 $aPreface to the first edition; Preface to the second edition; Introduction; 1. Interactions of particles and radiation with matter; 2. Characteristic properties of detectors; 3. Units of radiation measurements and radiation sources; 4. Accelerators; 5. Main physical phenomena used for particle detection and basic counter types; 6. Historical track detectors; 7. Track detectors; 8. Calorimetry; 9. Particle identification; 10. Neutrino detectors; 11. Momentum measurement and muon detection; 12. Ageing and radiation effects; 13. Example of a general-purpose detector: Belle; 14. Electronics; 15. Data analysis; 16. Applications of particle detectors outside particle physics; 17. Glossary; 18. Solutions; 19. Resume?; Appendixes; Index. 330 8 $aThe scope of the detection techniques in particle detectors is very wide, depending on the aim of the measurement. Detectors cover the measurement of energies from the very low to the highest of energies observed in cosmic rays. Describing the instrumentation for experiments in high energy physics and astroparticle physics, this edition describes track detectors, calorimeters, particle identification, neutrino detectors, momentum measurement, electronics, and data analysis. It also discusses applications of these detectors in other fields such as nuclear medicine, radiation protection and environmental science. Problem sets have been added to each chapter and additional instructive material has been provided, making this an excellent reference for graduate students and researchers in particle physics. 410 0$aCambridge monographs on particle physics, nuclear physics and cosmology ;$v26. 606 $aNuclear counters 615 0$aNuclear counters. 676 $a539.77 700 $aGrupen$b Claus$0150507 702 $aShwartz$b Boris A. 702 $aSpieler$b Helmuth 702 $aEidelman$b S$g(Simon), 702 $aStroh$b Tilo 801 0$bStDuBDS 801 1$bStDuBDS 906 $aBOOK 912 $a9910734332603321 996 $aParticle detectors$9257097 997 $aUNINA