Cryptography for Secure Encryption / Robert G. Underwood |
Autore | Underwood, Robert G. |
Pubbl/distr/stampa | Cham, : Springer, 2022 |
Descrizione fisica | xii, 319 p. : ill. ; 24 cm |
Soggetto non controllato |
Automatic sequences
Complexity theory Cryptanalysis Cryptography Cyber Security Encryption Key generation Public key cryptosystem Symmetric key cryptosystem |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNICAMPANIA-VAN0277024 |
Underwood, Robert G. | ||
Cham, : Springer, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Cryptography for Secure Encryption / Robert G. Underwood |
Autore | Underwood, Robert G. |
Pubbl/distr/stampa | Cham, : Springer, 2022 |
Descrizione fisica | xii, 319 p. : ill. ; 24 cm |
Soggetto topico |
11G07 - Elliptic curves over local fields [MSC 2020]
14G50 - Applications to coding theory and cryptography of algebraic geometry [MSC 2020] 94-XX - Information and communication theory, circuits [MSC 2020] 94A60 - Cryptography [MSC 2020] |
Soggetto non controllato |
Automatic sequences
Complexity theory Cryptanalysis Cryptography Cyber Security Encryption Key generation Public key cryptosystem Symmetric key cryptosystem |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNICAMPANIA-VAN00277024 |
Underwood, Robert G. | ||
Cham, : Springer, 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Vanvitelli | ||
|
Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugia Souppaya, Karen Kent, Paul M. Johnson |
Autore | Souppaya Murugiah |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
JohnsonPaul M
ScarfoneKaren |
Collana | NIST special publication |
Soggetto non controllato |
Anti-virus
Authentication Computer security COTS Encryption Firewall Hardening IPsec Lockdown Malware Microsoft Operating system Security checklist Security configuration Security controls Security policy Security templates Spyware Threats W |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Guidance for securing Microsoft Windows XP for IT Professionals |
Record Nr. | UNINA-9910711179703321 |
Souppaya Murugiah | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recommendation for block cipher modes of operation [[electronic resource] ] : the CCM mode for authentication and confidentiality / / Morris Dworkin |
Autore | Dworkin Morris |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004] |
Descrizione fisica | iv, 21 pages : digital, PDF file |
Altri autori (Persone) | DworkinM. J |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Computer security - Standards - United States
Authentication - Standards Data encryption (Computer science) |
Soggetto non controllato |
Authenticated encryption
Authentication Block cipher Confidentiality Cryptography Encryption Information security Message authentication code Mode of operation |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Recommendation for block cipher modes of operation |
Record Nr. | UNINA-9910695294003321 |
Dworkin Morris | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2004] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|