CISSP Practice Exams, Third Edition
Don’t Let the Real Test Be Your First Test!
Fully updated throughout and featuring new question types, this self-study tool contains more than 1250 realistic practice exam questions covering all 10 CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. Designed to help you pass the exam, this is the perfect companion to CISSP All-in-One Exam Guide.
Covers all 10 CISSP domains:
Information security governance and risk management
Security architecture and design
Physical (environmental) security
Telecommunications and network security
Business continuity and disaster recovery planning
Legal, regulations, investigations, and compliance
Software development security
Louis C. Guillou
Advances in Cryptology – EUROCRYPT ’95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May … (Lecture Notes in Computer Science)
EUROCRYPT ’95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d’Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and – plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT ’95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young – glish lady, Miss Virginia Cooper, for the secretariat of both the Organization arid Program Committees. They all did an excellent job in preparing the conference.
Introduction to Cryptography with Open-Source Software
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises.
Focusing on the cryptosystems themselves rather than the means of breaking them, the book first explores when and how the methods of modern cryptography can be used and misused. It then presents number theory and the algorithms and methods that make up the basis of cryptography today. After a brief review of “classical” cryptography, the book introduces information theory and examines the public-key cryptosystems of RSA and Rabin’s cryptosystem. Other public-key systems studied include the El Gamal cryptosystem, systems based on knapsack problems, and algorithms for creating digital signature schemes.
The second half of the text moves on to consider bit-oriented secret-key, or symmetric, systems suitable for encrypting large amounts of data. The author describes block ciphers (including the Data Encryption Standard), cryptographic hash functions, finite fields, the Advanced Encryption Standard, cryptosystems based on elliptical curves, random number generation, and stream ciphers. The book concludes with a look at examples and applications of modern cryptographic systems, such as multi-party computation, zero-knowledge proofs, oblivious transfer, and voting protocols.
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
If the National Security Agency (NSA) had wanted to make sure that strong encryption would reach the masses, it couldn’t have done much better than to tell the cranky geniuses of the world not to do it.
Topics in Cryptology — CT-RSA 2015: The Cryptographer’s Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings
This book constitutes the refereed proceedings of the Cryptographer’s Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.
Elwyn R Berlekamp
Algebraic Coding Theory, Revised Edition
This is the revised edition of Berlekamp’s famous book, “Algebraic Coding Theory”, originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field. One of these is an algorithm for decoding Reed-Solomon and Bose–Chaudhuri–Hocquenghem codes that subsequently became known as the Berlekamp–Massey Algorithm. Another is the Berlekamp algorithm for factoring polynomials over finite fields, whose later extensions and embellishments became widely used in symbolic manipulation systems. Other novel algorithms improved the basic methods for doing various arithmetic operations in finite fields of characteristic two. Other major research contributions in this book included a new class of Lee metric codes, and precise asymptotic results on the number of information symbols in long binary BCH codes.
Selected chapters of the book became a standard graduate textbook.
Both practicing engineers and scholars will find this book to be of great value.
Readership: Researchers in coding theory and cryptography, algebra and number theory, and software engineering.
Çetin Kaya Koç
This book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type material for professional engineers and computer information specialists.