Now updated your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: *Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis *Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems *Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM *Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields. A solutions manual is available. Please email ialine@wiley.com to obtain it.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Mark Stamp, PhD, is Professor of Computer Science at San Jose State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency. He has written dozens of academic papers and two books on the topic of information security.
<p><b>NOW UPDATED—YOUR EXPERT GUIDE TO TWENTY-FIRST CENTURY INFORMATION SECURITY</b> <p>Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of <i>Information Security: Principles and Practice</i> provides the skills and knowledge readers need to tackle any information security challenge. <p>Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: <ul> <li><b>Cryptography:</b> classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis</li> <li><b>Access control:</b> authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems</li> <li><b>Protocols:</b> simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM</li> <li><b>Software:</b> flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security</li> </ul> <p>This <i>Second Edition</i> features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development. <p>Minimizing theory while providing clear, accessible content, <i>Information Security</i> remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 11,36 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerEUR 30,70 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerAnbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers 17425850-6
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Hardcover. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.15. Bestandsnummer des Verkäufers G0470626399I3N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.15. Bestandsnummer des Verkäufers G0470626399I4N00
Anzahl: 1 verfügbar
Anbieter: SGS Trading Inc, Franklin Lakes, NJ, USA
Hardcover. Zustand: Good. Textbook, May Have Highlights, Notes and/or Underlining, BOOK ONLY-NO ACCESS CODE, NO CD, Ships with Tracking. Bestandsnummer des Verkäufers SKU0215745
Anzahl: 2 verfügbar
Anbieter: Indiana Book Company, Marion, IN, USA
Zustand: Good. Ships same or next business day with delivery confirmation. Good condition. May or may not contain highlighting. Expedited shipping available. Bestandsnummer des Verkäufers 1000008880523-1805
Anzahl: 2 verfügbar
Anbieter: Goodwill Northern Illinois, Rockford, IL, USA
Zustand: good. The cover shows wear with possible indentations, creases, and small tears. The pages show wear that may include evidence of handling, smudges, and edge discoloration markings stains . The book may or may not have mild corner dings. Bestandsnummer des Verkäufers 4LFTY7000B4P_ns
Anzahl: 1 verfügbar
Anbieter: Basement Seller 101, Cincinnati, OH, USA
hardcover. Zustand: New. Bestandsnummer des Verkäufers 240629067
Anzahl: 1 verfügbar
Anbieter: ZBK Books, Carlstadt, NJ, USA
Zustand: very_good. Used book in very good and clean conditions. Minor cosmetic defects may be present. Pages and cover intact. May include library marks, notes marks and highlighting. Fast Shipping. Bestandsnummer des Verkäufers ZWM.O8S5
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 2nd edition. 550 pages. 9.25x6.46x1.43 inches. In Stock. Bestandsnummer des Verkäufers 0470626399
Anzahl: 1 verfügbar
Anbieter: SecondSale, Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00028774011
Anzahl: 1 verfügbar