Information security : principles and practice

"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While n...

Full description

Bibliographic Details
Main Author: Stamp, Mark (Author)
Format: eBook
Language:English
Published: Hoboken, NJ : Wiley-Interscience 2005
ISBN:9780471744191
0471744190
0471738484
9780471738480
1280241446
9781280241444
0471744182
9780471744184
Item Description:Description based upon print version of record
Physical Description:Online-Ressource (Text + Images)
DOI:10.1002/0471744190
Subjects:
QR Code: Show QR Code
Description:
  • "As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--Jacket
  • Your expert guide to information securityAs businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:* Cryptography: classic cryptosystem
Contents:
  • CONTENTS; Preface; About The Author; Acknowledgments; 1 INTRODUCTION; 2 CRYPTO BASICS; 3 SYMMETRIC KEY CRYPTO; 4 PUBLIC KEY CRYPTO; 5 HASH FUNCTIONS AND OTHER TOPICS; 6 ADVANCED CRYPTANALYSIS; 7 AUTHENTICATION; 8 AUTHORIZATION; 9 SIMPLE AUTHENTICATION PROTOCOLS; 10 REAL-WORLD SECURITY PROTOCOLS; 11 SOFTWARE FLAWS AND MALWARE; 12 INSECURITY IN SOFTWARE; 13 OPERATING SYSTEMS AND SECURITY; APPENDIX; ANNOTATED BIBLIOGRAPHY; INDEX;
Regensburger Classification System:
    Detailed View Regensburger Classification System
    ST 230
    ST 277