Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
15,314
result(s) for
"COMPUTERS / Security / Cryptography"
Sort by:
Quantum Information Theory
by
Wilde, Mark M.
in
COMPUTERS / Security / Cryptography. bisacsh
,
Data processing
,
Electronic data processing
2013
Finally, here is a modern, self-contained text on quantum information theory suitable for graduate-level courses. Developing the subject 'from the ground up' it covers classical results as well as major advances of the past decade. Beginning with an extensive overview of classical information theory suitable for the non-expert, the author then turns his attention to quantum mechanics for quantum information theory, and the important protocols of teleportation, super-dense coding and entanglement distribution. He develops all of the tools necessary for understanding important results in quantum information theory, including capacity theorems for classical, entanglement-assisted, private and quantum communication. The book also covers important recent developments such as superadditivity of private, coherent and Holevo information, and the superactivation of quantum capacity. This book will be warmly welcomed by the upcoming generation of quantum information theorists and the already established community of classical information theorists.
Network Anomaly Detection
by
Bhattacharyya, Dhruba Kumar
,
Kalita, Jugal Kumar
in
Anomaly detection (Computer security)
,
Computer networks
,
Computer networks -- Security measures
2013,2014
This book discusses the detection of anomalies in computer networks from a machine learning perspective. It examines how computer networks work and how they can be attacked by intruders in search of fame, fortune, or challenge. You'll learn how to look for patterns in captured network traffic data to unearth potential intrusion attempts. Coverage includes machine learning techniques and algorithms, a taxonomy of attacks, and practical tools for launching attacks, capturing packet or flow traffic, extracting features, detecting attacks, and evaluating performance.
Democratizing Cryptography
by
Rebecca, Slayton
in
COM053000 COMPUTERS / Security / General
,
COMPUTERS / Security / Cryptography
,
COMPUTERS / Security / Networking
2022
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptograpy, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more.While other books have documented the development of public key cryptograpy, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distiguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman.The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.
Breaking Ransomware
by
Narula, Jitender
,
Narula, Atul
in
COM015000 COMPUTERS / Security / Viruses & Malware
,
Computer science
,
COMPUTERS / Computer Simulation
2023
Crack a ransomware by identifying and exploiting weaknesses in its design
Key Features
? Get an overview of the current security mechanisms available to prevent ransomware digital extortion.
? Explore different techniques to analyze a ransomware attack.
? Understand how cryptographic libraries are misused by malware authors to code ransomwares.
Description
Ransomware is a type of malware that is used by cybercriminals. So, to break that malware and find loopholes, you will first have to understand the details of ransomware. If you are looking to understand the internals of ransomware and how you can analyze and detect it, then this book is for you. This book starts with an overview of ransomware and its building blocks. The book will then help you understand the different types of cryptographic algorithms and how these encryption and decryption algorithms fit in the current ransomware architectures. Moving on, the book focuses on the ransomware architectural details and shows how malware authors handle key management. It also explores different techniques used for ransomware assessment. Lastly, the book will help you understand how to detect a loophole and crack ransomware encryption. By the end of this book, you will be able to identify and combat the hidden weaknesses in the internal components of ransomware.
What you will learn
? Get familiar with the structure of Portable Executable file format.
? Understand the crucial concepts related to Export Directory and Export Address Table.
? Explore different techniques used for ransomware static and dynamic analysis.
? Learn how to investigate a ransomware attack.
? Get expert tips to mitigate ransomware attacks.
Who this book is for
This book is for cybersecurity professionals and malware analysts who are responsible for mitigating malware and ransomware attacks. This book is also for security professionals who want to learn how to prevent, detect, and respond to ransomware attacks. Basic knowledge of C/C++, x32dbg and Reverse engineering skills is a must.
Table of Contents
Section I: Ransomware Understanding
1. Warning Signs, Am I Infected?
2. Ransomware Building Blocks
3. Current Defense in Place
4. Ransomware Abuses Cryptography
5. Ransomware Key Management
Section II: Ransomware Internals
6. Internal Secrets of Ransomware
7. Portable Executable Insides
8. Portable Executable Sections
Section III: Ransomware Assessment
9. Performing Static Analysis
10. Perform Dynamic Analysis
Section IV: Ransomware Forensics
11. What's in the Memory
12. LockCrypt 2.0 Ransomware Analysis
13. Jigsaw Ransomware Analysis
Section V: Ransomware Rescue
14. Experts Tips to Manage Attacks
Introduction to Cryptography with Open-Source Software
2011,2016
This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own programs and develop a deep and solid understanding of the mechanics of cryptography. The author, a noted educator in the field, covers the methods, algorithms, and applications of modern cryptographic systems. He provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises.
Blocks and Chains
by
Weippl, Edgar
,
Judmayer, Aljosha
,
Stifter, Nicholas
in
Computer programming, programs, data
,
Computer Science
,
Electronic funds transfers
2022,2017
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum posts, mailing lists, and other online publications. Also the original Bitcoin paper which initiated the hype was published online without any prior peer review. Following the original publication spirit of the Bitcoin paper, a lot of innovation in this field has repeatedly come from the community itself in the form of online publications and online conversations instead of established peer-reviewed scientific publishing. On the one side, this spirit of fast free software development, combined with the business aspects of cryptographic currencies, as well as the interests of today's time-to-market focused industry, produced a flood of publications, whitepapers, and prototypes. On the other side, this has led to deficits in systematization and a gap between practice and the theoretical understanding of this new field. This book aims to further close this gap and presents a well-structured overview of this broad field from a technical viewpoint. The archetype for modern cryptographic currencies and consensus ledgers is Bitcoin and its underlying Nakamoto consensus. Therefore we describe the inner workings of this protocol in great detail and discuss its relations to other derived systems.
Cybersecurity - A Self-Teaching Introduction
by
Garg, Amit
,
Goyal, K. K
in
Business enterprises
,
COM053000 COMPUTERS / Security / General
,
Computer networks
2020
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, Cyberlaw, and more. Features: Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, self-teaching format; Includes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more.
Computer Security and Encryption - An Introduction
by
Chauhan, S. R
,
Jangra, S
in
big data analytics
,
cloud
,
COM053000 COMPUTERS / Security / General
2020
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers.