Stamp, Mark.

Information security : principles and practice / Mark Stamp. - Hoboken, N.J. : Wiley-Interscience, ©2006. - 1 online resource (xxi, 390 pages) : illustrations

Includes bibliographical references (pages 359-379) and index.

Crypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security.

Use copy

'As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges.''Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.'--Jacket.


Electronic reproduction.
[S.l.] :
HathiTrust Digital Library,
2010.


Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
http://purl.oclc.org/DLF/benchrepro0212

0471744182 9780471744184 9780471738480 0471738484 0471744190 9780471744191 1280241446 9781280241444

10.1002/0471744190 doi

OverDrive, Inc. http://www.overdrive.com 310C0D18-7395-435E-BA71-41A0448F3D13 OverDrive, Inc. http://www.overdrive.com


Computer security.
Sécurité informatique.
Ordinateurs--Accès--Contrôle.
Logiciels--Protection.
Protocoles de réseaux d'ordinateurs--Sécurité--Mesures.
Cryptographie.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer security.


Electronic books.

QA76.9.A25 / S69 2006eb

005.8