Information security : principles and practice / Mark Stamp, San Jose State University, San Jose, California.

By: Stamp, Mark [author.]Material type: TextTextPublisher: Hoboken, NJ : John Wiley & Sons, Inc., c2022Edition: Third editionDescription: xvi, 430 pages : illustrationsContent type: text Media type: unmediated Carrier type: volumeISBN: 9781119505907 [hardbound]Subject(s): Computer securityDDC classification: 005.8 St23 2022
Contents:
Contents: I Crypto -- 1 Introductions -- 2 Classic crypto -- 3 Symmetric ciphers -- 4 Public key crypto -- 5 Crypto has functions++ -- II Access control -- 6 Authentication -- 7 Authorization -- III Topics in network security -- 8 Network security basics -- 9 Simple authentication protocols -- 10 Real-world security protocols -- IV Software -- 11 Software flaws and malware -- 12 Insecurity in software.
Summary: Summary: "Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security"--
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Book Book College Library
005.8 St23 2022 (Browse shelf) Available 3UCBL000026514

Includes bibliographical references and index.

Contents: I Crypto -- 1 Introductions -- 2 Classic crypto -- 3 Symmetric ciphers -- 4 Public key crypto -- 5 Crypto has functions++ -- II Access control -- 6 Authentication -- 7 Authorization -- III Topics in network security -- 8 Network security basics -- 9 Simple authentication protocols -- 10 Real-world security protocols -- IV Software -- 11 Software flaws and malware -- 12 Insecurity in software.

Summary: "Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security"--

Moma Ortega Computer Studies, Information Technology, Information Systems and Animation Computer Studies : Information Technology

English

There are no comments on this title.

to post a comment.

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha