|
![]() |
|||
|
||||
OverviewThis is your expert guide to information security. As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key; cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems. It also includes protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security. Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint[registered] slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. This is an ""Instructor's Manual"" presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available. Full Product DetailsAuthor: Mark StampPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Inc Dimensions: Width: 16.40cm , Height: 2.70cm , Length: 23.90cm Weight: 0.708kg ISBN: 9780471738480ISBN 10: 0471738484 Pages: 416 Publication Date: 01 September 2005 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Out of Stock Indefinitely Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsReviews...presents information security concepts and practices insightfully in an easily comprehensible style...Although primarily intended as a college course resource, this book will appeal also to many security professionals. Highly recommended. (CHOICE, April 2006) The book is well suited for beginners, and contains enough introductory material on a variety of topics. (Computing Reviews.com, January 9, 2006) Author InformationMARK STAMP, PHD, is Professor of Computer Science, San Jose State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency. Tab Content 6Author Website:Countries AvailableAll regions |