Литмир - Электронная Библиотека
Литмир - Электронная Библиотека > Roebuck Kevin (EN) > Disk Encryption: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Disk Encryption: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Добавить похожую книгу
Hideaway
Похожа
Непохожа
Analysing Sociolinguistic Variation
Похожа
Непохожа
You're the Boss
Похожа
Непохожа
Your Pregnancy for the Father-to-Be
Похожа
Непохожа
Nathan Coulter
Автор: Berry Wendell (EN)
Похожа
Непохожа
Wrack
Автор: Bradley James (EN)
Похожа
Непохожа
History of Sweets in 50 Wrappers
Автор: Norman Phil (EN)
Похожа
Непохожа
David McWilliams' The Generation Game
Похожа
Непохожа
Lemonade Crime
Похожа
Непохожа
Disk Encryption: High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Author:Roebuck Kevin (EN)
A introductory fragment is available
Language of a book: Английский
Publisher: Gardners Books

    Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk). This book presents cryptographic aspects of the problem and different software packages and hardware devices devoted to this problem like disk encryption software and disk encryption hardware. This book is your ultimate resource for Disk Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Disk Encryption right away, covering: Disk encryption theory, Aloaha, BestCrypt, BitLocker Drive Encryption, Cold boot attack, Comparison of disk encryption software, Comparison of encrypted external drives, Cryptmount, Disk encryption, Disk encryption hardware, Disk encryption software, DiskCryptor, Dm-crypt, E4M, ECryptfs, EncFS, Encryption layer in storage stack, Filesystem-level encryption, FileVault, FreeOTFE, GBDE, Geli (software), Hardware-based full disk encryption, IEEE P1619, Linux Unified Key Setup, List of cryptographic file systems, On-the-fly encryption, PGPDisk, Private Disk, Scramdisk, Sentry 2020, Transparent Data Encryption, TrueCrypt, Trusted Storage specification, United States v. Boucher, USB flash drive security, Watermarking attack, Block cipher modes of operation, AEAD block cipher modes of operation, CBC-MAC, CCM mode, CWC mode, EAX mode, Galois/Counter Mode, Initialization vector, OCB mode, Block cipher, Cipher security summary, 3-Way, ABC (block cipher), Advanced Encryption Standard, Akelarre (cipher), Anubis (cipher), ARIA (cipher), BaseKing, BassOmatic, BATON, Blowfish (cipher), Camellia (cipher), CAST-128, CAST-256, Cellular Message Encryption Algorithm, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, CLEFIA, Cobra ciphers, COCONUT98, Content Scramble System, Crab (cipher), Cryptomeria cipher, CRYPTON, CS-Cipher, Data Encryption Standard, DEAL, DFC (cipher), E2 (cipher), FEA-M, FEAL, Format-preserving encryption, FROG, GDES, GOST (block cipher), Grand Cru (cipher), Hasty Pudding cipher, Hierocrypt, IAPM (mode), ICE (cipher), Idea NXT, Injected-Block Cipher RBSC algorithm, Intel Cascade Cipher, International Data Encryption Algorithm, Iraqi block cipher, KeeLoq, Key whitening, KFB mode, KHAZAD, Khufu and Khafre, KN-Cipher, Ladder-DES, Libelle (cipher), LOKI97, M6 (cipher), M8 (cipher), MacGuffin (cipher), MAGENTA, MARS (cryptography), Mercy (cipher), MESH (cipher), MISTY1, MMB, MULTI2, MultiSwap, New Data Seal, NewDES, Nimbus (cipher), NOEKEON, NUSH, Product cipher, Q (cipher), RC2, RC5, RC6, Red Pike (cipher), REDOC, S-1 block cipher, SAFER, SAVILLE, SC2000, SEED, Serpent (cipher), SHACAL, SHARK, Skipjack (cipher), SMS4, Spectr-H64, Square (cipher), Substitution-permutation network, SXAL/MBAL, Threefish, Tiny Encryption Algorithm, Treyfer, Triple DES, Twofish, UES (cipher), Xenon (cipher), Xmx, XTEA, XXTEA, Zodiac (cipher) This book explains in-depth the real drivers and workings of Disk Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Disk Encryption with the objectivity of experienced professionals.

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :0]]>  ]]>Livejournal :0]]>  ]]>Мой мир :0]]>  ]]>Gmail :3]]>  Email :0  ]]>Скачать :0]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и отзывы вам нужно зайти на сайт или зарегистрироваться

    {"b":"461928","o":30}