45 products were found matching your search for Security Protocols in 3 shops:
-
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
Vendor: Abebooks.com Price: 59.95 $"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism’s efficiency, rigorousness, and the possibility of its automation are also presented.The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.
-
Cryptographic Protocol : Security Analysis Based on Trusted Freshness
Vendor: Abebooks.com Price: 98.19 $"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism’s efficiency, rigorousness, and the possibility of its automation are also presented.The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.
-
Network Protocols for Security Professionals : Probe and Identify Network-Based Vulnerabilities and Safeguard Against Network Protocol Breaches
Vendor: Abebooks.com Price: 48.26 $Used book that is in clean, average condition without any missing pages.
-
Cryptography - Algorithms, Protocols, and Standards for Computer Security
Vendor: Abebooks.com Price: 112.09 $New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
-
Cryptography: Algorithms, Protocols, and Standards for Computer Security
Vendor: Abebooks.com Price: 118.09 $Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported
-
Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series)
Vendor: Abebooks.com Price: 54.91 $Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
-
GW Security GW12871MIP 12 MP IP POE 3X Optical Zoom 3.6 mm to 11 mm Motorized Lens Dome Security Camera with Built-In Microphone
Vendor: Homedepot.com Price: 610.38 $Our 12-Series IP Cameras provide top of the line picture quality day or night, with the convenience of 1 cable operation, and the reassurance of considerable weather and tamper proofing. The 12871MIP is a white, dome style internet protocol camera with a motorized lens, intended for use both indoors and outdoors. It has 12 mega-pixel resolution at 25 frames per second, more than quintuple the resolution of any 1080p HD camera. 30 built-in infrared LED lights allow the camera to operate in complete darkness and still provide incredible video up to 165 ft. Remotely adjusting the motorized lens between 3.6 mm and 11 mm provides flexibility, allowing the 12871ip to provide wide angle views or hone in on sensitive areas. 1 cable connected to a Power-over-Ethernet switch transmits both power and data to the camera, making installation, maintenance, and expansion easier than analog security systems that require separate data and power cables. With an IP66 weatherproof rating, rain, snow, or blistering heat will not impede function, and the 129871ips high quality tamper-proof construction will dissuade even the most zealous of vandals. P2P remote access using the mobile app means video from the 12871IP can be viewed anywhere in the world with an internet connection, providing peace of mind no matter the location or time of day. Size: 3x.
-
GW Security GW128360ER Wired 12 MP 1.85 mm Fisheye Lens Dome Security Camera, 360° View, 2-Way Audio
Vendor: Homedepot.com Price: 68.92 $The GW128360ER is a white, dome style internet protocol camera with a 360° Fisheye Lens, intended for use indoors. It has 12 mega-pixel resolution at 25 frames per second, more than quintuple the resolution of any 1080p HD camera. Built-in infrared allows the camera to operate in complete darkness and still provide incredible video up to 65 ft. Equipped with a fisheye lens for 180° panoramic view (wall mount) or 360° surround view (ceiling/floor mount) with zero blind spots, this camera is able to provide coverage of wide open areas. GW Security chooses 12-Megapixel on the 360° platform because the high resolution images produced are particularly advantageous in the panoramic format, delivering substantially more picture detail across the broad field of view. In addition, the wide field of view an 360° camera captures allows it to replace multiple standard security cameras. 1 cable connected to a Power-over-Ethernet switch transmits both power and data to the camera, making installation, maintenance, and expansion easier than analog security systems that require separate data and power cables. High quality tamper-proof construction will dissuade even the most zealous of vandals. P2P remote access using the mobile app means video from the 12871IP can be viewed anywhere in the world with an internet connection, providing peace of mind no matter the location or time of day.
-
Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture (4th Edition)
Vendor: Abebooks.com Price: 51.92 $Explains how voice and video are sent over IP internets and how IP Telephony operates, describes IP security and the security standard, IPsec, reviews the discussion of IPv6 to incorporate the latest changes, and explains Random Early Discard (RED), recommended for routers. DLC: Principles, protocols, and architectures.
-
Internetworking with TCP/IP Vol. I: Principles, Protocols, and Architecture"
Vendor: Abebooks.com Price: 2.38 $This new edition of Volume 1 covers the latest IPng development and information. The text discusses security in TCP/IP environments and firewall designs as well as bridges and routers, presenting routing architectures for large and small internets. It also explains TCP transport services.
-
Attacking Network Protocols : A Hacker's Guide to Capture, Analysis, and Exploitation
Vendor: Abebooks.com Price: 34.21 $Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities.You’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to:- Capture, manipulate, and replay packets- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol- Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service- Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network trafficAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.
-
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Vendor: Abebooks.com Price: 51.85 $". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
-
IPv6: The New Internet Protocol (2nd Edition)
Vendor: Abebooks.com Price: 39.73 $Explains the new Internet protocol standard in detail, comparing IPv6 to IPv4 and discussing benefits of IPv6, such as support for rapid Internet growth, multicasting, real-time multimedia, and enhanced security. Shows how to prepare networks, equipment, and software for the new standard and walks through transition options including a dual-stack strategy and tunneling. For Internet professionals. Annotation c. by Book News, Inc., Portland, Or.
-
MQTT Essentials - A Lightweight IoT Protocol: Send and receive messages with the MQTT protocol for your IoT solutions. (Paperback or Softback)
Vendor: Abebooks.com Price: 48.14 $Key FeaturesMake your connected devices less prone to attackers by understanding practical security mechanismsDive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examplesLearn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examplesBook DescriptionThis step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python.Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages.Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messagesWhat you will learnUnderstand how MQTTv3.1 and v3.1.1 works in detailInstall and secure a Mosquitto MQTT broker by following
-
Hacking VoIP: Protocols, Attacks, and Countermeasures
Vendor: Abebooks.com Price: 5.97 $Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishingAudit VoIP network securityAssess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and VonageUse common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAXIdentify the many vulnerabilities in any VoIP networkWhether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
-
MQTT Essentials - A Lightweight IoT Protocol: Send and receive messages with the MQTT protocol for your IoT solutions.
Vendor: Abebooks.com Price: 36.63 $Key FeaturesMake your connected devices less prone to attackers by understanding practical security mechanismsDive deep into one of IoT's extremely lightweight machines to enable connectivity protocol with some real-world examplesLearn to take advantage of the features included in MQTT for IoT and Machine-to-Machine communications with complete real-life examplesBook DescriptionThis step-by-step guide will help you gain a deep understanding of the lightweight MQTT protocol. We'll begin with the specific vocabulary of MQTT and its working modes, followed by installing a Mosquitto MQTT broker. Then, you will use best practices to secure the MQTT Mosquitto broker to ensure that only authorized clients are able to publish and receive messages. Once you have secured the broker with the appropriate configuration, you will develop a solution that controls a drone with Python.Further on, you will use Python on a Raspberry Pi 3 board to process commands and Python on Intel Boards (Joule, Edison and Galileo). You will then connect to the MQTT broker, subscribe to topics, send messages, and receive messages in Python. You will also develop a solution that interacts with sensors in Java by working with MQTT messages.Moving forward, you will work with an asynchronous API with callbacks to make the sensors interact with MQTT messages. Following the same process, you will develop an iOS app with Swift 3, build a website that uses WebSockets to connect to the MQTT broker, and control home automation devices with HTML5, JavaScript code, Node.js and MQTT messagesWhat you will learnUnderstand how MQTTv3.1 and v3.1.1 works in detailInstall and secure a Mosquitto MQTT broker by following
-
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Vendor: Abebooks.com Price: 20.51 $". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
-
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Vendor: Abebooks.com Price: 73.73 $". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
-
Hacking VoIP: Protocols, Attacks, and Countermeasures
Vendor: Abebooks.com Price: 20.95 $Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishingAudit VoIP network securityAssess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and VonageUse common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAXIdentify the many vulnerabilities in any VoIP networkWhether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
-
Packet Guide to Core Network Protocols
Vendor: Abebooks.com Price: 21.28 $Take an in-depth tour of core Internet protocols and learn how they work together to move data packets from one network to another. With this updated edition, you’ll dive into the aspects of each protocol, including operation basics and security risks, and learn the function of network hardware such as switches and routers. New chapters examine the transmission control protocol (TCP) and user datagram protocol in detail.Ideal for beginning network engineers, each chapter in this book includes a set of review questions, as well as practical, hands-on lab exercises.You’ll explore topics including:Basic network architecture: how protocols and functions fit togetherThe structure and operation of the Ethernet protocolTCP/IP protocol fields, operations, and addressing used for networksThe address resolution process in a typical IPv4 networkSwitches, access points, routers, and components that process packetsTCP details, including packet content and client-server packet flowHow the Internet Control Message Protocol provides error messages during network operationsHow network mask (subnetting) helps determine the networkThe operation, structure, and common uses of the user datagram protocol
45 results in 0.276 seconds
Related search terms
© Copyright 2025 shopping.eu