This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications...
As a business owner, you are probably faced with hundreds of decisions that must be made weekly. Diving headlong into a technical effort might be scary. Diving into a security and operations effort is something you likely don't know how to do.
That's where this book comes in. This book helps you fill in the blanks for...
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...
Currently the mobile wireless technology is experiencing rapid
growth. However the major challenge for deployment of this technology
with its special characteristics is securing the existing and future
vulnerabilities. Major security and privacy issues for standard wireless
networks include the authentication of wireless clients and...
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included...
This book is designed to cover the strategic, operational, and tactical aspects of the
conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints
of what many are calling cyber warfare today. One comes from a commercial
background and the other brings the military viewpoint. The book is designed to help...
This monograph on Security in Computing Systems: Challenges, Approaches and
Solutions aims at introducing, surveying and assessing the fundamentals of secu
rity with respect to computing. Here, “computing” refers to all activities which
individuals or groups directly or indirectly perform by means of computing sys
tems,...
This book will prove to be a practical resource for anyone who is considering
using, building, or securing a cloud implementation. Security professionals may
refer to this book as a source of detailed information for evaluating and verifying
cloud security policy and requirements. Cloud infrastructure engineers, cloud services...
A company’s most important asset next to its people is its
information.
This information includes intellectual property,
company
financial information, confidential employee information,
customer information, and so much more. Company
information
may be stored in databases, spreadsheets, flat files,
and so on. Loss of...
We live in a world in which we can’t trust our computers. For example, how can we
know for sure that our hardware manufacturer did not hide malicious code in the
system’s microchip? Or that our freshly installed operating system does not contain
backdoors created by a rogue developer from the OS development team?
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
The Android mobile platform has quickly risen from its first phone in October 2008
to the most popular mobile operating system in the world by early 2011. The
explosive growth of the platform has been a significant win for consumers with
respect to competition and features. However, forensic analysts and security engineers
have...