Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security : Principles and Practice

Buy
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:

  • Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
  • Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
  • Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security

Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems—ranging from basic to challenging—to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint® slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.

About the Author

MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.

(HTML tags aren't allowed.)

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Programming in Objective-C 2.0 (2nd Edition) (Developer's Library)
Programming in Objective-C 2.0 (2nd Edition) (Developer's Library)

 

From the author of Programming in C,Programming in Objective-C 2.0 provides the new programmer a complete, step-by-step introduction to the Objective-C language. The book does not assume previous experience with either C or object-oriented programming...

Data Structures and Program Design in C++
Data Structures and Program Design in C++

Progressing from the concrete to the abstract — and using numerous, substantial case studies and sample programs — this book explores structured problem solving, data abstraction, software engineering principles, and the comparative analysis of algorithms as fundamental tools of program design. The book and all programs have been...


How to Program Using C++
How to Program Using C++
Welcome to a book about learning to program.

Before we go any further, you need to be absolutely clear about what it is that you are holding in your hand. This is possibly a book with the name of a programming language in the title that is unlike any book with the name of a programming language in the title that you have encountered
...
Hadoop Real World Solutions Cookbook - Second Edition
Hadoop Real World Solutions Cookbook - Second Edition

Key Features

  • Implement outstanding Machine Learning use cases on your own analytics models and processes.
  • Solutions to common problems when working with the Hadoop ecosystem.
  • Step-by-step implementation of end-to-end big data use cases.

Who This Book Is For

...

Introduction to Residential Layout
Introduction to Residential Layout
Accessible guide to theory and practice of residential design.

Introduction to Residential Layout is ideal for students and practitioners of urban design, planning, engineering, architecture and landscape seeking a comprehensive guide to the theory and practice of designing and laying out residential areas.

Mike
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy