Let us wish you a happy birthday!
Date of Birth
Please fill in a complete birthday Enter a valid birthday
×
This item is currently out of stock
Information Security , Principles and Practice byMark Stamp
Be the first to rate this product 
×
Check Products in stock Products in stock

Sponsored products for you

PRODUCT INFORMATION

  •  

    Specifications

    Category Type
    Information Technology
    ISBN
    9780471738480
    Item EAN
    2724334534021
    People
    Author
    مارك ستامب
    People
    Publisher
    Wiley-Interscience
    Category Type
    Information Technology
    ISBN
    9780471738480
    Item EAN
    2724334534021
    People
    Author
    مارك ستامب
    People
    Publisher
    Wiley-Interscience
    Languages and countries
    Book Language
    English
    Read more
  •  

    Description:

    Your expert guide to information security

    As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by

    Your expert guide to information security

    As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:
    * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis
    * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
    * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM
    * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security

    Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.

    An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.

    An Instructor Support FTP site is also available

 

Customer Reviews

0
No ratings yet
Be the first to rate this product
Rate this product:

×

Please verify your mobile number to complete your checkout

We will send you an SMS containing a verification code. Please double check your mobile number and click on "Send Verification Code".

+ Edit