Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security : Principles and Practice

Buy
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:

  • Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
  • Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
  • Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security

Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems—ranging from basic to challenging—to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint® slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.

About the Author

MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.

(HTML tags aren't allowed.)

Microsoft Windows Server 2008 Administration (Network Professionals Library)
Microsoft Windows Server 2008 Administration (Network Professionals Library)
I have read hundreds of books throughout my career, as I’m sure many of you have, and I’ve found three general categories of technical books: On one end of the spectrum are books geared toward beginners that help readers get a basic understanding of each topic but are only skin deep. On the other extreme are highly technical reference...
Macromedia MX eLearning: Advanced Training from the Source
Macromedia MX eLearning: Advanced Training from the Source

With International Data Corp. projecting e-learning to be an $11.5 billion industry by 2003, the demand for interactive multimedia learning applications is on the rise. And Macromedia's Studio MX design tools-including Flash MX, Dreamweaver MX, and ColdFusion MX-provide the ideal solution. But figuring out how to combine these...

Handbook of Applied Analysis (Advances in Mechanics and Mathematics)
Handbook of Applied Analysis (Advances in Mechanics and Mathematics)
Accurate models to describe real-world phenomena are indispensable for research in such scientific fields as physics, engineering, biology, chemistry, and economics. The tools and techniques of applied analysis facilitate the development of mathematical models and can thereby serve as an excellent resource for students and researchers in various...

Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)

The book addresses the problem known in the literature as Open and Distance Learning (ODL). ODL describes new concepts of the process of learning-teaching organization. ODL is becoming very popular at universities that offer education via online and/or distance learning, both in synchronous or asynchronous modes. More precisely, the...

Manufacturing Execution System - MES
Manufacturing Execution System - MES
The classical factory fades into history as production plants today develop into modern service centers. Problems in management arise for which many companies are not yet prepared: economic efficiency of modern added value is not a property of products alone but of the process. Decisive potential in business now is a question of process capability,...
Run-time Models for Self-managing Systems and Applications (Autonomic Systems)
Run-time Models for Self-managing Systems and Applications (Autonomic Systems)

This edited volume focuses on the adoption of run-time models for the design and management of autonomic systems. Traditionally, performance models have a central role in the design of computer systems. Models are used at design-time to support the capacity planning of the physical infrastructure and to analyze the effects and trade-offs of...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy