Amazon cover image
Image from Amazon.com

Information security : principles and practice / Mark Stamp.

By: Analytics: Show analyticsPublication details: Hoboken, N.J. : Wiley-Interscience, ©2006.Description: 1 online resource (xxi, 390 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 0471744182
  • 9780471744184
  • 9780471738480
  • 0471738484
  • 0471744190
  • 9780471744191
  • 1280241446
  • 9781280241444
Subject(s): Genre/Form: Additional physical formats: Print version:: Information security.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 S69 2006eb
Online resources:
Contents:
Crypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security.
Action note:
  • digitized 2010 HathiTrust Digital Library committed to preserve
In: Wiley e-booksReview: 'As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges.''Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.'--Jacket.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references (pages 359-379) and index.

Crypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security.

Use copy Restrictions unspecified star MiAaHDL

'As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges.''Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.'--Jacket.

Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL

Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. MiAaHDL

http://purl.oclc.org/DLF/benchrepro0212

digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL

Print version record.

There are no comments on this title.

to post a comment.

Contact Us

Perpustakaan Tun Seri Lanang, Universiti Kebangsaan Malaysia
43600 Bangi, Selangor Darul Ehsan,Malaysia
+603-89213446 – Consultation Services
019-2045652 – Telegram/Whatsapp
Email: helpdeskptsl@ukm.edu.my

Copyright ©The National University of Malaysia Library