modular course on internet and information skills

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic «orange book» view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.



Что искали на сайте
кружка printio пионы | dsquared2 пляжные брюки и шорты | cs 12 24 in s hook s hook not include pot | 110cm wide wedding dress lace embroidery diy women clothes materials clothing fabric accessories ivory white church happy hour | printio soviet tank | faux pearl espadrille flatform sliders | linux® administrator street smarts | best deal quartz watch women fashion tower pattern diamond dial watches men faux leather watch women s dress clock montre relo | 14pcs set stainless steel dumplings wrappers cutter maker tools cake moulds mousse ring round stainless steel cookie molds set | брюки fiorella rubino fiorella rubino fi013ewbeeg7 | cute resin bride and bridegroom toy doll | резиновые сапоги playtoday playtoday mp002xg006pn | autumn summer new women shirt dress long sleeved female dresses slim fashion party office lady sundress plus size casual rob | 350a 500a gas welding gun shunt connecting rod insulation cover bent pipe nozzle gas welding gun accessories welder gun parts | creative fun cheese snacks pu pocketbook coin bag girls purse small canvas purse cat coin purse | len deighton spy line | лампа энергосберегающая tdm sq0323 0054 | motorcycle atv riding scooter driving flying protective frame clear lens portable vintage helmet goggles glasses for 2009 buell xb12r | skeleton skull head silicone chocolate muffin cupcake candy ice cube mold halloween | issey miyake l eau d issey pour homme summer edition eau de toilette | macarons ceiling lamps rose colors metal lamp body acrylic lamp shade colorful post modern ceiling light led lighting fixture | батарейка perfeo алкалиновая pf lr6 4sh | кеды y | deadly animals | the shining |