Magnifying Glass
Search Loader

Mark Stamp 
Information Security 
Principles and Practice

Support
Adobe DRM
Cover of Mark Stamp: Information Security (PDF)
Now updated–your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge.

Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes:

* Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis

* Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba’s model, firewalls, and intrusion detection systems

* Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM

* Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security

This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic ‘orange book’ view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development.

Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
€101.99
payment methods

Table of Content

Preface xv

About the Author xix

Acknowledgments xxi

1 Introduction 1

I Crypto 17

2 Crypto Basics 19

3 Symmetric Key Crypto 51

4 Public Key Crypto 89

5 Hash Functions¯++ 125

6 Advanced Cryptanalysis 167

II Access Control 227

7 Authentication 229

8 Authorization 265

III Protocols 311

9 Simple Authentication Protocols 313

10 Real-World Security Protocols 351

IV Software 401

11 Software Flaws and Malware 403

12 Insecurity in Software 447

13 Operating Systems and Security 491

Appendix 511

Annotated Bibliography 531

Index 572

About the author

MARK STAMP, PHD, is Professor of Computer Science at San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years’ experience working as a cryptanalyst at the U.S. National Security Agency. He has written dozens of academic papers and two books on the topic of information security.
Language English ● Format PDF ● Pages 606 ● ISBN 9781118027950 ● File size 29.3 MB ● Publisher John Wiley & Sons ● Published 2011 ● Edition 2 ● Downloadable 24 months ● Currency EUR ● ID 2351297 ● Copy protection Adobe DRM
Requires a DRM capable ebook reader

More ebooks from the same author(s) / Editor

824 Ebooks in this category