This is your expert guide to information security. As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key; cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems. It also includes protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security. Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint[registered] slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. This is an "Instructor's Manual" presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
MARK STAMP, PHD, is Professor of Computer Science, San Jose State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : Better World Books Ltd, Dunfermline, Royaume-Uni
Etat : Very Good. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur 4744393-6
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books Ltd, Dunfermline, Royaume-Uni
Etat : Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur GRP11305533
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Hardcover. Etat : Fair. No Jacket. Missing dust jacket; Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less. N° de réf. du vendeur G0471738484I5N01
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books: West, Reno, NV, Etats-Unis
Etat : Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur GRP11305533
Quantité disponible : 1 disponible(s)
Vendeur : Better World Books: West, Reno, NV, Etats-Unis
Etat : Very Good. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. N° de réf. du vendeur 4744393-6
Quantité disponible : 1 disponible(s)
Vendeur : WeBuyBooks, Rossendale, LANCS, Royaume-Uni
Etat : Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Ex library copy with usual stamps & stickers. N° de réf. du vendeur wbs6843118812
Quantité disponible : 1 disponible(s)
Vendeur : The Slavic Collection, Faaborg, Danemark
Hardback. Etat : Very Good ++. 1. Edition. Like new.xvii+390 pages. Excellent copy in hardback. your expert guide to twenty-first century information securityInformation security is a rapidly evolving field. As businesses and consumers become increasingly dependent. N° de réf. du vendeur 1413
Quantité disponible : 1 disponible(s)
Vendeur : Book Lover's Warehouse, Johnson City, TN, Etats-Unis
hardcover. Etat : As New. FAST SHIPPING & FREE TRACKING! The pages of this book are clean and unmarked. N° de réf. du vendeur 223007
Quantité disponible : 1 disponible(s)