Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security : Principles and Practice

Buy
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:

  • Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
  • Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
  • Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security

Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems—ranging from basic to challenging—to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint® slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.

About the Author

MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.

(HTML tags aren't allowed.)

Long-Term Preservation of Digital Documents: Principles and Practices
Long-Term Preservation of Digital Documents: Principles and Practices
Key to our culture is that we can disseminate information, and then maintain and access it over time. While we are rapidly advancing from vulnerable physical solutions to superior, digital media, preserving and using data over the long term involves complicated research challenges and organization efforts.

Uwe Borghoff and his coauthors...

Jesus and His Death: Historiography, the Historical Jesus, and Atonement Theory
Jesus and His Death: Historiography, the Historical Jesus, and Atonement Theory
This is a brave book. With due awareness of the historical traps and with a mastery of the recent relevant literature, McKnight here asks the crucial question, How did Jesus interpret his own death? His answer, which hearkens back to Albert Schweitzer, does full justice to Jesus' eschatological outlook and makes good sense within a first-century...
BEA Weblogic(R) Server Bible
BEA Weblogic(R) Server Bible
WebLogic Server is an industrial−strength application server developed and marketed by BEA Systems, Inc.
of San Jose, California. WebLogic is a pure−Java implementation of the Java 2 Platform, Enterprise Edition,
more commonly known as J2EE. J2EE represents Sun’s serious effort to make Java a powerful platform for...

Mastering Unreal Technology, Volume I: Introduction to Level Design with Unreal Engine 3
Mastering Unreal Technology, Volume I: Introduction to Level Design with Unreal Engine 3

Mastering Unreal Technology, Volume I: Introduction to Level Design with Unreal Engine 3 is your start-to-finish guide to modding and level design with the world’s hottest new gaming engine: Unreal Engine 3. Here’s everything you need to know to jumpstart your skills and create stunning new content and...

MCTS Windows Server 2008 Active Directory Configuration Study Guide: Exam 70-640
MCTS Windows Server 2008 Active Directory Configuration Study Guide: Exam 70-640

With Microsoft's release of Windows Server 2008 and a new generation of certification exams, IT administrators have more reason than ever to certify their expertise in the world's leading server software. Inside, find the full coverage you need to prepare for Exam 70-640: Windows Server 2008 Active Directory, Configuring, one of three...

Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy