A Multidisciplinary Introduction to Information Security
โ Scribed by Stig F. Mjolsnes
- Publisher
- CRC Press
- Year
- 2011
- Tongue
- English
- Leaves
- 342
- Series
- Discrete Mathematics and its Applications
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Front Cover
Preface
Contributors
List of Figures
List of Tables
Contents
1. Introduction
2. Security Electronics
3. Public Key Cryptography
4. Cryptographic Hash Functions
5. Quantum Cryptography
6. Cryptographic Protocols
7. Public Key Distribution
8. Wireless Network Access
9. Mobile Security
10. A Lightweight Approach to Secure Software Engineering
11. ICT Security Evaluation
12. ICT and Forensic Science
13. Risk Assessment
14. Information Security Management—From Regulations to End Users
๐ SIMILAR VOLUMES
<p>Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provid
Although more than 70% of the globe is covered with water, only a small portion is suitable for direct human use, making the scarcity of freshwater one of our plant's most serious challenges. In this context "desalination", defined as "the removal of salt from water", is one of the possible solution
This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted behaviour mediated by the networks which connect them. Due to the widespread use of the Internet in modern society for activities ranging from social netw
Cyber Warfare has become a global problem threatening governments, corporations and individuals.<br>This new domain of warfare is not only inhabited by governments such as China, Russia, Iran, and the United States, but a variety of other actors including insurgent groups like Hezbollah and Hamas as
Cyber Warfare has become a global problem threatening governments, corporations and individuals.<br>This new domain of warfare is not only inhabited by governments such as China, Russia, Iran, and the United States, but a variety of other actors including insurgent groups like Hezbollah and Hamas as