7. He Who Steals My Purse ...

Chapter Spotlight

• Physical data loss from benign or malicious cause; loss of availability and potential loss of confidentiality

• Protecting computers and data against physical harm from theft, hardware failure, or disasters

• Encryption concepts; analytic attacks against cryptosystems

• Symmetric (or secret key) encryption

• DES and AES encryption algorithms

Get Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.