Information Security : Principles and Practice /

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography suc...

Full description

Saved in:
Bibliographic Details
Main Author: Stamp, Mark (Author)
Format: Unknown
Language:English
Published: Hoboken, NJ : Wiley, 2022
Edition:Third edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :QA 76.9.A25

MARC

LEADER 00000 a2200000 4500
001 106054
003 MY-KlNDU
005 20250702110538.0
006 a|||| |||| 001 0
007 ta
008 250702s20222022njua 001 0 eng d
020 |a 9781119505907 (hbk) 
040 |a DLC  |b eng  |c MY-KlNDU  |e rda 
050 0 0 |a QA 76.9.A25 
090 |a QA 76.9.A25  |b S69 2022 
100 1 |a Stamp, Mark,  |e author 
245 1 0 |a Information Security :  |b Principles and Practice /  |c Mark Stamp, San Jose State University, San Jose, California 
250 |a Third edition 
264 1 |a Hoboken, NJ :  |b Wiley,  |c 2022 
264 4 |c ©2022 
300 |a xvi, 430 pages :  |b illustrations ;  |c 24 cm 
336 |a text   |2 rdacontent 
337 |a unmediated   |2 rdamedia 
338 |a volume   |2 rdacarrier 
504 |a Includes bibliographical references and index 
520 |a Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security 
650 0 |a Computer security 
942 |c 1  |2 lcc 
999 |c 106054  |d 106054