Disk Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Disk Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

von: Kevin Roebuck

Emereo Publishing, 2012

ISBN: 9781743332979

Format: PDF

Kopierschutz: DRM

Windows PC,Mac OSX Apple iPad, Android Tablet PC's

Preis: 38,09 EUR

Mehr zum Inhalt

Disk Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors


 

Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device (e.g., a hard disk). This book presents cryptographic aspects of the problem and different software packages and hardware devices devoted to this problem like disk encryption software and disk encryption hardware. This book is your ultimate resource for Disk Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Disk Encryption right away, covering: Disk encryption theory, Aloaha, BestCrypt, BitLocker Drive Encryption, Cold boot attack, Comparison of disk encryption software, Comparison of encrypted external drives, Cryptmount, Disk encryption, Disk encryption hardware, Disk encryption software, DiskCryptor, Dm-crypt, E4M, ECryptfs, EncFS, Encryption layer in storage stack, Filesystem-level encryption, FileVault, FreeOTFE, GBDE, Geli (software), Hardware-based full disk encryption, IEEE P1619, Linux Unified Key Setup, List of cryptographic file systems, On-the-fly encryption, PGPDisk, Private Disk, Scramdisk, Sentry 2020, Transparent Data Encryption, TrueCrypt, Trusted Storage specification, United States v. Boucher, USB flash drive security, Watermarking attack, Block cipher modes of operation, AEAD block cipher modes of operation, CBC-MAC, CCM mode, CWC mode, EAX mode, Galois/Counter Mode, Initialization vector, OCB mode, Block cipher, Cipher security summary, 3-Way, ABC (block cipher), Advanced Encryption Standard, Akelarre (cipher), Anubis (cipher), ARIA (cipher), BaseKing, BassOmatic, BATON, Blowfish (cipher), Camellia (cipher), CAST-128, CAST-256, Cellular Message Encryption Algorithm, CIKS-1, CIPHERUNICORN-A, CIPHERUNICORN-E, CLEFIA, Cobra ciphers, COCONUT98, Content Scramble System, Crab (cipher), Cryptomeria cipher, CRYPTON, CS-Cipher, Data Encryption Standard, DEAL, DFC (cipher), E2 (cipher), FEA-M, FEAL, Format-preserving encryption, FROG, GDES, GOST (block cipher), Grand Cru (cipher), Hasty Pudding cipher, Hierocrypt, IAPM (mode), ICE (cipher), Idea NXT, Injected-Block Cipher RBSC algorithm, Intel Cascade Cipher, International Data Encryption Algorithm, Iraqi block cipher, KeeLoq, Key whitening, KFB mode, KHAZAD, Khufu and Khafre, KN-Cipher, Ladder-DES, Libelle (cipher), LOKI97, M6 (cipher), M8 (cipher), MacGuffin (cipher), MAGENTA, MARS (cryptography), Mercy (cipher), MESH (cipher), MISTY1, MMB, MULTI2, MultiSwap, New Data Seal, NewDES, Nimbus (cipher), NOEKEON, NUSH, Product cipher, Q (cipher), RC2, RC5, RC6, Red Pike (cipher), REDOC, S-1 block cipher, SAFER, SAVILLE, SC2000, SEED, Serpent (cipher), SHACAL, SHARK, Skipjack (cipher), SMS4, Spectr-H64, Square (cipher), Substitution-permutation network, SXAL/MBAL, Threefish, Tiny Encryption Algorithm, Treyfer, Triple DES, Twofish, UES (cipher), Xenon (cipher), Xmx, XTEA, XXTEA, Zodiac (cipher) This book explains in-depth the real drivers and workings of Disk Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Disk Encryption with the objectivity of experienced professionals.