Unavailable
Unavailable
Unavailable
Ebook315 pages9 hours
Information Security: Principles and Practice
By Mark Stamp
Rating: 0 out of 5 stars
()
Currently unavailable
Currently unavailable
About this ebook
Your expert guide to information security
As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:
* Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
* Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
* Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
* Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security
Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.
An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.
An Instructor Support FTP site is also available.
As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:
* Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
* Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
* Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
* Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security
Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.
An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.
An Instructor Support FTP site is also available.
Unavailable
Read more from Mark Stamp
Information Security: Principles and Practice Rating: 0 out of 5 stars0 ratings
Related to Information Security
Related ebooks
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security Rating: 0 out of 5 stars0 ratingsIntrusion Detection Honeypots Rating: 3 out of 5 stars3/5Design and Analysis of Distributed Algorithms Rating: 0 out of 5 stars0 ratingsSecure Roaming in 802.11 Networks Rating: 4 out of 5 stars4/5Introduction to CDMA Wireless Communications Rating: 0 out of 5 stars0 ratingsMoments and Moment Invariants in Pattern Recognition Rating: 0 out of 5 stars0 ratingsPrinciples of Ad-hoc Networking Rating: 0 out of 5 stars0 ratingsStatistical DNA Forensics: Theory, Methods and Computation Rating: 0 out of 5 stars0 ratingsDevelopment Research in Practice: The DIME Analytics Data Handbook Rating: 0 out of 5 stars0 ratingsThe Art and Science of Digital Compositing Rating: 0 out of 5 stars0 ratingsPlatform Interference in Wireless Systems: Models, Measurement, and Mitigation Rating: 5 out of 5 stars5/5Poverty in a Rising Africa Rating: 0 out of 5 stars0 ratingsSemiparametric Regression for the Social Sciences Rating: 3 out of 5 stars3/5Digital Watermarking and Steganography Rating: 5 out of 5 stars5/5The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice Rating: 0 out of 5 stars0 ratingsTCP/IP Clearly Explained Rating: 4 out of 5 stars4/5Demystifying Chipmaking Rating: 0 out of 5 stars0 ratingsLocation-Based Services: Fundamentals and Operation Rating: 0 out of 5 stars0 ratingsNetwork Congestion Control: Managing Internet Traffic Rating: 0 out of 5 stars0 ratingsTemplate Matching Techniques in Computer Vision: Theory and Practice Rating: 0 out of 5 stars0 ratingsStochastic Methods and their Applications to Communications: Stochastic Differential Equations Approach Rating: 0 out of 5 stars0 ratingsAntenna Arraying Techniques in the Deep Space Network Rating: 0 out of 5 stars0 ratingsDigital Media Processing: DSP Algorithms Using C Rating: 0 out of 5 stars0 ratingsContent Production Technologies Rating: 0 out of 5 stars0 ratingsSmart Card Applications: Design models for using and programming smart cards Rating: 0 out of 5 stars0 ratingsWireless Sensor and Actuator Networks: Technologies, Analysis and Design Rating: 0 out of 5 stars0 ratingsLead-free Electronics Rating: 0 out of 5 stars0 ratingsEngineering Global E-Commerce Sites: A Guide to Data Capture, Content, and Transactions Rating: 5 out of 5 stars5/5Digital Audio Signal Processing Rating: 0 out of 5 stars0 ratingsPollution Prevention: Methodology, Technologies and Practices Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CISSP Study Guide Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Information Security
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews