Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In todays technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A comp
Information Security: Principles and Practice, Second Edition
β Scribed by Mark Stamp(auth.)
- Year
- 2011
- Tongue
- English
- Leaves
- 591
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Now updatedβyour expert guide to twenty-first century information security
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge.
Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes:
- Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
- Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems
- Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM
- Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security
This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development.
Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
A solutions manual is available. Please email [email protected] to obtain it.Content:
Chapter 1 Introduction (pages 1β16):
Chapter 2 Crypto Basics (pages 17β49):
Chapter 3 Symmetric Key Crypto (pages 51β87):
Chapter 4 Public Key Crypto (pages 89β123):
Chapter 5 Hash Functions++ (pages 125β165):
Chapter 6 Advanced Cryptanalysis (pages 167β225):
Chapter 7 Authentication (pages 227β264):
Chapter 8 Authorization (pages 265β310):
Chapter 9 Simple Authentication Protocols (pages 311β349):
Chapter 10 Real?World Security Protocols (pages 351β400):
Chapter 11 Software Flaws and Malware (pages 401β446):
Chapter 12 Insecurity in Software (pages 447β489):
Chapter 13 Operating Systems and Security (pages 491β510):
π SIMILAR VOLUMES
Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus
Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan
Chapter 1: Why Study Information Security? -- Chapter 2: Information Security Principles of Success -- Chapter 3: Certification Programs and the Common Body of Knowledge -- Chapter 4: Governance and Risk Management -- Chapter 5: Security Architecture and Design -- Chapter 6: Business Continuity Plan
Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focus