Jörg Schwenk - Böcker
Visar alla böcker från författaren Jörg Schwenk. Handla med fri frakt och snabb leverans.
9 produkter
9 produkter
Guide to Internet Cryptography
Security Protocols and Real-World Attack Implications
Inbunden, Engelska, 2022
933 kr
Skickas inom 10-15 vardagar
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:· Covers the essential standards in Internet cryptography· Integrates work exercises and problems in each chapter· Focuses especially on IPsec, secure e-mail and TLS· Summarizes real-world cryptography in three introductory chapters· Includes necessary background from computer networks· Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes· Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
Guide to Internet Cryptography : Security Protocols and Real-World Attack Implications
Engelska, 2022
631 kr
Skickas inom 5-8 vardagar
Guide to Internet Cryptography
Security Protocols and Real-World Attack Implications
Häftad, Engelska, 2023
660 kr
Skickas inom 10-15 vardagar
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:· Covers the essential standards in Internet cryptography· Integrates work exercises and problems in each chapter· Focuses especially on IPsec, secure e-mail and TLS· Summarizes real-world cryptography in three introductory chapters· Includes necessary background from computer networks· Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes· Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
550 kr
Skickas inom 10-15 vardagar
Identitätsdiebstahl und Identitätsmissbrauch im Internet
Rechtliche und technische Aspekte
Inbunden, Tyska, 2011
1 188 kr
Skickas inom 10-15 vardagar
Schwerpunkte der Studie liegen auf der systematischen Darstellung gegenwärtiger Angriffe und der künftigen Entwicklung von Angriffen, der Bedeutung des neuen Personalausweises für die Bekämpfung von Identitätsmissbrauch, der Strafbarkeit und Strafverfolgung von Tätern sowie der Haftung für Identitätsmissbrauch.
461 kr
Skickas inom 10-15 vardagar
Datenschutz und Identitätsschutz stellen die neuen und künftigen Geschäftsfelder von E-Commerce und E-Government vor wichtige Herausforderungen. Dies gilt insbesondere für das Cloud Computing. Renommierte Autoren aus Wissenschaft und Praxis beleuchten aktuelle Probleme aus rechtlicher und technischer Perspektive. Das Werk richtet sich an Juristen und technische Verantwortliche in Behörden und Unternehmen sowie an Rechtsanwälte und Wissenschaftler.
649 kr
Skickas inom 10-15 vardagar
Hierzu zählen bekannte Standards wie TLS, OpenPGP, S/MIME, SSH, IPsec und WPA, aber auch die versteckten Sicherheitsfeatures aus der Microsoft-Welt (PPTP, Kerberos), dem Mobilfunk, DNSSEC, Single-Sign-On-Protokollen und Datenformaten wie XML und JSON.
303 kr
Skickas inom 10-15 vardagar
In diesem Buch werden die wichtigsten kryptographischen Verfahren, Protokolle und Algorithmen der letzten Jahrzehnte erläutert und mathematisch-logisch begründet. Die besprochenen Themen reichen von Public-Key-Kryptographie über Zero-Knowledge-Protokolle bis hin zu Kryptographie in der Blockchain und im Darknet.Den Autoren gelingt es, diese zum Teil sehr komplexen Themen vergleichsweise einfach und anschaulich darzustellen. Es werden kaum Vorkenntnisse vorausgesetzt, denn alle nötigen mathematischen und kryptografischen Ergebnisse werden im Buch bereitgestellt.Das Buch ist modular aufgebaut, so dass die einzelnen Kapitel weitgehend unabhängig voneinander gelesen werden können. Jedes Thema wird dabei auf verschiedenen Ebenen dargestellt: Zunächst möglichst anschaulich, dann mathematisch präzise und abschließend noch im Hinblick auf die Stärken und Schwächen des jeweiligen Protokolls.Geeignet ist das Buch sowohl für Studierende (Mathematik, Informatik, Technik u.ä.) als auch für Anwender, Manager und andere Verantwortliche – etwa Datenschutz- und Datensicherheitsbeauftragte in Behörden und Unternehmen oder Projektmanager und Softwareentwickler in der Industrie.
811 kr
Kommande
In this book, the most important cryptographic algorithms, protocols and constructions of the last decades are explained and justified from a mathematical point of view. The topics discussed range from public-key cryptography and zero-knowledge protocols to cryptography in blockchains and the Tor network.The authors succeed in presenting these complex topics in a simple and clear manner. Hardly any prior knowledge is required, as all the necessary mathematical and cryptographic background is provided in the book.The book has a modular structure so that the individual chapters can be read independently of one another. Each topic is presented at different levels: First, the concept is described as a mental model, then it is studied from a mathematical point of view, and finally the strengths and weaknesses of the respective protocol are discussed.The book is suitable for undergraduate students (e.g., in mathematics, computer science, electrical engineering)as well as for Internet users, tech managers, software developers and data protection/data security officers.This book is a translation of the original German 9th edition Moderne Verfahren der Kryptographie by Albrecht Beutelspacher, Jörg Schwenk and Klaus-Dieter Wolfenstetter, published by Springer-Verlag GmbH Germany, part of Springer Nature in 2022. The translation was done with the help of an artificial intelligence machine translation tool. A subsequent human revision was done primarily in terms of content, so that the book will read stylistically differently from a conventional translation.