Book description:Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography.
True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You’re led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security.
Challenging crypto puzzles in every chapter
Ready-to-implement cryptographic techniques explained
Lingo—Common security terms defined so that you’re in the know on the job
IMHO—Frank and relevant opinions based on the author’s years of industry experience
Budget Note—Tips for getting security technologies and processes into your organization’s budget
In Actual Practice—Exceptions to the rules of security explained in real-world contexts
Your Plan—Customizable checklists you can use on the job now
Into Action—Tips on how, why, and when to apply new skills and techniques at work
Sean Philip-Oriyano, CISSP, CNDA, CEH, CHFI, CEI, SCNP, MCT, CompTIA Security+, CompTIA Network+, is a 20-year veteran of the information technology field. He has created and delivered innovative training solutions for clients that include the US Air Force, US Navy, and US Army, and was hosted as a trainer at both the US Air Force Academy and Naval War College. Sean is also an experienced content developer, including textbooks, e-learning courses, test prep materials, study guides, video content, and has published on topics that include hacking and incident handling, client-side attacks, Steganography, and web application security for clients that include IBM, Amazon.com, Autodesk, Microsoft, J&B Learning, and Syngress.
Keywords: NETWORK SECURITY, NETWORK SECURITY HACKS, NETWORK SECURITY MONITORING, NETWORK SECURITY ESSENTIALS, NETWORKING SECURITY SYSTEMS, HACKING EXPOSED, CISSP, CNDA, CEH, CHFL, CEI, SCNP, MCT, SECURITY+, NETWORK+, IT, IT PROFESSIONALS, SECURITY, ENCRYPTION, NETWORK SECURITY, DATA, CLOUD, CLOUD COMPUTING, SSL, IPSEC, SSH, VPN, WEB APPLICATIONS, CIPHERS, EC-COUNCIL, CEH, COMPTIA, ISC2, CBK, RSA, BLACK HAT, SECURITY PROFESSIONALS, DATA STORAGE, DATA STORAGE ARCHITECTS, SECURITY MANAGERS, NETWORK ADMINISTRATORS, CRYPTOGRAPHY ANALYSTS, HISTORY OF CRYPTOGRAPHY, CIPHERS, ALGORITHMS, STEGANOGRAPHY, QUANTUM CRYPTOGRAPHY, APPLIED CRYPTOGRAPHY, PUBLIC KEY INFASTRUCTURE, CODE BREAKING, HASHING, MESSAGE DIGESTS, LANGUAGE OF CRYPTOGRAPHY, CRYPTO PUZZLES, THEORETICAL CRYPTOGRAPHY MODELS, CRYPTO MODELS, U.S. AIR FORCE, U.S. NAVY, U.S. ARMY, INCIDENT HANDELING, CLIENT-SIDE ATTACKS, IBM, AMAZON, AUTODESK, MICROSOFT, J&B LEARNING, SYNGRESS, SECURITY, NETWORKING, HACKING EXPOSED, HACKING EXPOSED WEB 2.0, HACKING EXPOSED VOIP, HACKING EXPOSED WINDOWS, HACKING EXPOSED WEB APPLICATIONS, HACKING EXPOSED CISCO NETWORKS, GRAY HAT HACKING, HACKING EXPOSED WIRELESS, HACKING EXPOSED COMPUTER FORENSICS, 19 DEADLY SINS OF SOFTWARE SECURITY, 24 DEADLY SINS OF SOFTWARE SECURITY, CCNA CISCO CERTIFIED NETWORK ASSOCIATE STUDY GUIDE, CCENT CISCO CERTIFIED ENTRY NETWORKING TECHNICIAN STUDY GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE WIRELESS STUDY GUIDE, CISSP ALL-IN-ONE EXAM GUIDE, MOBILE APPLICATION SECURITY, HACKING EXPOSED MALWARE AND ROOTKITS, HACKING EXPOSED COMPUTER FORENSICS, HACKING EXPOSED VIRTUALIZATION & CLOUD COMPUTING, IT SECURITY METRICS, SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) IMPLEMENTATION, IT AUDITING, CISSP BOXED SET, CISA CERTIFIED INFORMATION SYSTEMS AUDITOR ALL-IN-ONE EXAM GUIDE, MIKE MEYERS' COMPTIA SECURITY+ CERTIFICATION PASSPORT, SECURITY+ ALL-IN-ONE EXAM GUIDE, COMPTIA A+ CERTIFICATION ALL-IN-ONE EXAM GUIDE, CCNA CISCO CERTIFIED NETWORK ASSOCIATE SECURITY STUDY GUIDE, CWSP CERTIFIED WIRELESS SECURITY PROFESSIONAL OFFICIAL STUDY GUIDE, CWNA CERTIFIED WIRELESS NETWORK ADMINISTRATOR & CWSP CERTIFIED WIRELESS SECURITY PROFESSIONAL ALL-IN-ONE EXAM GUIDE, CTS CERTIFIED TECHNOLOGY SPECIALIST EXAM GUIDE, PRINCIPLES OF COMPUTER SECURITY COMPTIA SECURITY+ AND BEYOND LAB MANUAL, PRINCIPLES OF COMPUTER SECURITY, COMPTIA SECURITY+ AND BEYOND, COMPTIA A+ CERTIFICATION BOXED SET, COMPTIA SECURITY+ CERTIFICATION STUDY GUIDE, COMPTIA SECURITY+ CERTIFICATION PRACTICE EXAMS, COMPTIA SECURITY+ ALL-IN-ONE EXAM GUIDE, COMPTIA SECURITY+ CERTIFICATION BOXED SET, SECURITY METRICS A BEGINNER'S GUIDE, WIRELESS NETWORK SECURITY A BEGINNER'S GUIDE, COMPUTER FORENSICS A BEGINNER'S GUIDE, SECURING THE CLICKS, NETWORK SECURITY IN THE AGE OF SOCIAL MEDIA, CEH CERTIFIED ETHICAL HACKER ALL-IN-ONE EXAM GUIDE, SSCP SYSTEMS SECURITY CERTIFIED PRACTITIONER ALL-IN-ONE EXAM GUIDE, NETWORK SECURITY THE COMPLETE REFERENCE, REVERSE DECEPTION, SECURITY AUTOMATION ESSENTIALS, CISSP BOXED SET, SECOND EDITION, CISSP PRACTICE EXAMS, SECOND EDITION, CISSP BOXED SET, SECOND EDITION, CISSP ALL-IN-ONE EXAM GUIDE, 6TH EDITION, THE COMPUTER INCIDENT RESPONSE PLANNING HANDBOOK, MALWARE, ROOTKITS & BOTNETS, A BEGINNER'S GUIDE