𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Information Security Principles and Practice

✍ Scribed by Mark Stamp


Publisher
Wiley-Interscience
Year
2005
Tongue
English
Leaves
413
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.


πŸ“œ SIMILAR VOLUMES


Information Security : Principles and Pr
✍ Mark Stamp πŸ“‚ Library πŸ“… 2005 🌐 English

Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus

Information security: principles and pra
✍ Breithaupt, Jim;Merkow, Mark S πŸ“‚ Library πŸ“… 2014 πŸ› Pearson Education Limited (US titles) 🌐 English

Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan

Information security: principles and pra
✍ Breithaupt, Jim;Merkow, Mark S πŸ“‚ Library πŸ“… 2014 πŸ› Pearson 🌐 English

Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan

Information Security Principles and Pra
✍ Mark Stamp πŸ“‚ Library πŸ“… 2011 πŸ› Wiley 🌐 English

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most curren

Information Security: Principles and Pra
✍ Mark Stamp(auth.) πŸ“‚ Library πŸ“… 2011 🌐 English

<b>Now updatedβ€”your expert guide to twenty-first century information security</b><p> Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentialit