Information security : principles and practice / Mark Stamp
Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Hoboken, NJ : Wiley, c2011Edition: 2nd ed (Online-Ausg.)Description: Online-Ressource (1 online resource (xxi, 584 p.)) : illISBN:- 9781283138871
- 1283138875
- 9781118027950
- 005.8
- COM053000
- QA76.9.A25
Contents:
Summary: Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems andSummary: Intro -- Contents -- Preface -- About The Author -- Chapter 1 Introduction -- Part 1 Crypto -- Chapter 2 Crypto Basics -- Chapter 3 Symmetric Key Crypto -- Chapter 4 Public Key Crypto -- Chapter 5 Hash Functions++ -- Chapter 6 Advanced Cryptanalysis -- Part 2 Access Control -- Chapter 7 Authentication -- Chapter 8 Authorization -- Part 3 Protocols -- Chapter 9 Simple Authentication Protocols -- Simple Authentication Protocols -- Chapter 10 Real-World Security Protocols -- Part IV Software -- Chapter 11 Software Flaws and Malware -- Chapter 12 Insecurity in Software -- Chapter 13 Operating Systems and Security -- Annotateci Bibliography -- Index.PPN: PPN: 809323508Package identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PQE
No physical items for this record