An edition of Information Security (2005)

Information security

principles and practice

  • 0 Ratings
  • 10 Want to read
  • 0 Currently reading
  • 1 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 10 Want to read
  • 0 Currently reading
  • 1 Have read


Download Options

Buy this book

Last edited by ImportBot
December 19, 2023 | History
An edition of Information Security (2005)

Information security

principles and practice

  • 0 Ratings
  • 10 Want to read
  • 0 Currently reading
  • 1 Have read

"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--BOOK JACKET

Publish Date
Publisher
Wiley-Interscience
Language
English
Pages
390

Buy this book

Previews available in: English

Edition Availability
Cover of: Information security
Information security: principles and practice
2006, Wiley-Interscience
in English

Add another edition?

Book Details


Table of Contents

Crypto basics
Symmetric key crypto
Public key crypto
Hash functions and other topics
Advanced cryptanalysis
Authentication
Authorization
Simple authentication protocols
Real-world security protocols
Software flaws and malware
Insecurity in software
Operating systems and security.

Edition Notes

Includes bibliographical references (p. 359-379) and index.

Published in
Hoboken, N.J

Classifications

Library of Congress
QA76.9.A25 S69 2006, QA76.9.A25S69 2005

The Physical Object

Pagination
xxi, 390 p. :
Number of pages
390

ID Numbers

Open Library
OL15978508M
Internet Archive
informationsecur00stam_629
ISBN 10
0471738484
ISBN 13
9780471738480
LCCN
2005005152
OCLC/WorldCat
57754240
Library Thing
647150
Goodreads
1602573

Work Description

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

History

Download catalog record: RDF / JSON
December 19, 2023 Edited by ImportBot import existing book
May 28, 2023 Edited by MARC Bot import existing book
October 18, 2022 Edited by ImportBot import existing book
January 29, 2022 Edited by ImportBot import existing book
December 10, 2009 Created by WorkBot add works page