Your expert guide to information security
As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:
* Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
* Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
* Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
* Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security
Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.
An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.
An Instructor Support FTP site is also available.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.
Your expert guide to information security
As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:
Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems?ranging from basic to challenging?to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint® slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 4744393-6
Quantità: 1 disponibili
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Codice articolo GRP11305533
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Hardcover. Condizione: Good. 1. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Codice articolo 0471738484-11-1
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Hardcover. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.6. Codice articolo G0471738484I4N00
Quantità: 1 disponibili
Da: Better World Books Ltd, Dunfermline, Regno Unito
Condizione: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Codice articolo GRP11305533
Quantità: 1 disponibili
Da: Better World Books Ltd, Dunfermline, Regno Unito
Condizione: Very Good. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 4744393-6
Quantità: 1 disponibili
Da: The Book Spot, Sioux Falls, MN, U.S.A.
Hardcover. Condizione: New. Codice articolo Abebooks135897
Quantità: 1 disponibili
Da: The Slavic Collection, Vordingborg, Danimarca
Hardback. Condizione: Very Good ++. 1. Edition. Like new.xvii+390 pages. Excellent copy in hardback. your expert guide to twenty-first century information securityInformation security is a rapidly evolving field. As businesses and consumers become increasingly dependent. Codice articolo 1413
Quantità: 1 disponibili
Da: Book Lover's Warehouse, Johnson City, TN, U.S.A.
hardcover. Condizione: As New. FAST SHIPPING & FREE TRACKING! The pages of this book are clean and unmarked. Codice articolo 223007
Quantità: 1 disponibili