LEADER 02868oam 2200613I 450 001 9910783864003321 005 20230421043305.0 010 $a1-134-83632-5 010 $a1-134-83633-3 010 $a1-280-18498-1 010 $a0-203-41076-9 010 $a0-203-31979-6 024 7 $a10.4324/9780203410769 035 $a(CKB)1000000000250158 035 $a(EBL)166786 035 $a(OCoLC)52080852 035 $a(SSID)ssj0000160485 035 $a(PQKBManifestationID)11154739 035 $a(PQKBTitleCode)TC0000160485 035 $a(PQKBWorkID)10182354 035 $a(PQKB)11598116 035 $a(MiAaPQ)EBC166786 035 $a(Au-PeEL)EBL166786 035 $a(CaPaEBR)ebr10054830 035 $a(CaONFJC)MIL18498 035 $a(EXLCZ)991000000000250158 100 $a20180331d1998 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGalatians /$fPhilip F. Esler 210 1$aLondon ;$aNew York :$cRoutledge,$d1998. 215 $a1 online resource (305 p.) 225 1 $aNew Testament readings 300 $aDescription based upon print version of record. 311 $a0-415-11037-8 311 $a0-415-11036-X 320 $aIncludes bibliographical references (p. [260]-275) and indexes. 327 $aCover; Galatians; Copyright; Contents; List of Illustrations; Series editor's preface; Preface; List of abbreviations; 1. Reading Galatians; 2. Social identity and the epistle to the Galatians; 3. Context and rhetoric in Galatians; 4. The problem with mixed table-fellowship; 5. Paul, Jerusalem and Antioch; 6. Righteousness as privileged identity; 7. Paul and the law; 8. Freedom, the Spirit and community life (Gal. 4.21-6.10); Epilogue: the intercultural promise of Galatians; Appendix: Paul's attitude to the law in Rom. 5.20-21; Notes; References; Index of ancient sources 327 $aIndex of modern authors 330 $aPaul's letter to the Galatians, sometimes known as the Magna Carta of Christian liberty, is central to the understanding of the relation of Paul and the Law and is packed with crucial historical, social and theological material.Philip F. Esler provides a detailed and accessible interpretation of the text, which draws on contemporary and modern literary models. He outlines the problems often associated with reading Galatians, the context of the text, the rhetoric of the text and the intercultural and social implications of Galatians. Galatians includes comprehensive indices of anci 410 0$aNew Testament readings. 606 $aGroup identity 615 0$aGroup identity. 676 $a227/.406 700 $aEsler$b Philip Francis.$0566769 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910783864003321 996 $aGalatians$93835432 997 $aUNINA LEADER 05274nam 2200649Ia 450 001 9911019482303321 005 20260126114652.0 010 $a1-283-13887-5 010 $a9786613138873 010 $a1-118-02796-5 010 $a1-118-02797-3 010 $a1-118-02795-7 035 $a(CKB)2550000000037133 035 $a(EBL)738753 035 $a(SSID)ssj0000523419 035 $a(PQKBManifestationID)11322374 035 $a(PQKBTitleCode)TC0000523419 035 $a(PQKBWorkID)10540266 035 $a(PQKB)11141838 035 $a(MiAaPQ)EBC738753 035 $a(OCoLC)757511553 035 $a(CaSebORM)9781118027967 035 $a(EXLCZ)992550000000037133 100 $a20101020d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation security $eprinciples and practice /$fMark Stamp 205 $a2nd ed. 210 $aHoboken, NJ $cWiley$dc2011 215 $a1 online resource (608 p.) 300 $aDescription based upon print version of record. 311 08$a0-470-62639-9 320 $aIncludes bibliographical references (p. 531-571) and index. 327 $aInformation Security: Principles and Practice; Contents; Preface; About The Author; Acknowledgments; 1 Introduction; 1.1 The Cast of Characters; 1.2 Alice's Online Bank; 1.2.1 Confidentiality, Integrity, and Availability; 1.2.2 Beyond CIA; 1.3 About This Book; 1.3.1 Cryptography; 1.3.2 Access Control; 1.3.3 Protocols; 1.3.4 Software; 1.4 The People Problem; 1.5 Principles and Practice; 1.6 Problems; I Crypto; 2 Crypto Basics; 2.1 Introduction; 2.2 How to Speak Crypto; 2.3 Classic Crypto; 2.3.1 Simple Substitution Cipher; 2.3.2 Cryptanalysis of a Simple Substitution; 2.3.3 Definition of Secure 327 $a2.3.4 Double Transposition Cipher2.3.5 One-Time Pad; 2.3.6 Project VENONA; 2.3.7 Codebook Cipher; 2.3.8 Ciphers of the Election of 1876; 2.4 Modern Crypto History; 2.5 A Taxonomy of Cryptography; 2.6 A Taxonomy of Cryptanalysis; 2.7 Summary; 2.8 Problems; 3 Symmetric Key Crypto; 3.1 Introduction; 3.2 Stream Ciphers; 3.2.1 A5/1; 3.2.2 RC4; 3.3 Block Ciphers; 3.3.1 Feistel Cipher; 3.3.2 DES; 3.3.3 Triple DES; 3.3.4 AES; 3.3.5 Three More Block Ciphers; 3.3.6 TEA; 3.3.7 Block Cipher Modes; 3.4 Integrity; 3.5 Summary; 3.6 Problems; 4 Public Key Crypto; 4.1 Introduction; 4.2 Knapsack; 4.3 RSA 327 $a4.3.1 Textbook RSA Example4.3.2 Repeated Squaring; 4.3.3 Speeding Up RSA; 4.4 Diffie-Hellman; 4.5 Elliptic Curve Cryptography; 4.5.1 Elliptic Curve Math; 4.5.2 ECC Diffie-Hellman; 4.5.3 Realistic Elliptic Curve Example; 4.6 Public Key Notation; 4.7 Uses for Public Key Crypto; 4.7.1 Confidentiality in the Real World; 4.7.2 Signatures and Non-repudiation; 4.7.3 Confidentiality and Non-repudiation; 4.8 Public Key Infrastructure; 4.9 Summary; 4.10 Problems; 5 Hash Functions++; 5.1 Introduction; 5.2 What is a Cryptographic Hash Function?; 5.3 The Birthday Problem; 5.4 A Birthday Attack 327 $a5.5 Non-Cryptographic Hashes5.6 Tiger Hash; 5.7 HMAC; 5.8 Uses for Hash Functions; 5.8.1 Online Bids; 5.8.2 Spam Reduction; 5.9 Miscellaneous Crypto-Related Topics; 5.9.1 Secret Sharing; 5.9.2 Random Numbers; 5.9.3 Information Hiding; 5.10 Summary; 5.11 Problems; 6 Advanced Cryptanalysis; 6.1 Introduction; 6.2 Enigma; 6.2.1 Enigma Cipher Machine; 6.2.2 Enigma Keyspace; 6.2.3 Rotors; 6.2.4 Enigma Attack; 6.3 RC4 as Used in WEP; 6.3.1 RC4 Algorithm; 6.3.2 RC4 Cryptanalytic Attack; 6.3.3 Preventing Attacks on RC4; 6.4 Linear and Differential Cryptanalysis; 6.4.1 Quick Review of DES 327 $a6.4.2 Overview of Differential Cryptanalysis6.4.3 Overview of Linear Cryptanalysis; 6.4.4 Tiny DES; 6.4.5 Differential Cryptanalysis of TDES; 6.4.6 Linear Cryptanalysis of TDES; 6.4.7 Implications Block Cipher Design; 6.5 Lattice Reduction and the Knapsack; 6.6 RSA Timing Attacks; 6.6.1 A Simple Timing Attack; 6.6.2 Kocher's Timing Attack; 6.7 Summary; 6.8 Problems; II Access Control; 7 Authentication; 7.1 Introduction; 7.2 Authentication Methods; 7.3 Passwords; 7.3.1 Keys Versus Passwords; 7.3.2 Choosing Passwords; 7.3.3 Attacking Systems via Passwords; 7.3.4 Password Verification 327 $a7.3.5 Math of Password Cracking 330 $aNow updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract 606 $aComputer security 606 $aData protection 615 0$aComputer security. 615 0$aData protection. 676 $a005.8 686 $aCOM053000$2bisacsh 700 $aStamp$b Mark$f1960-$01889762 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019482303321 996 $aInformation security$94531073 997 $aUNINA