Information Security / Principles and Practice
Information Security / Principles and Practice
- 2nd
- John Wiley & Sons, Ltd, 2011
- 588
This book features new discussions of relevant security topics such as the SSH and WEB protocols, practical RSA timing attacks, botnets and security certification. Preface, Acknowledgements, Introduction, Crypto, Crypto Basics, Symmetric Key Crypto, Public Key Crypto, Hash Functions++, Advanced Cryptanalysis, Access Control, Authentication, Authorization, Protocols, Simple Authentication Protocols, Real-World Security Protocols, Software, Software Flaws and Malware, Insecurity in Software, Operating Systems and Security, Appendix, Annotated Bibliography, Index.
9780470636399
This book features new discussions of relevant security topics such as the SSH and WEB protocols, practical RSA timing attacks, botnets and security certification. Preface, Acknowledgements, Introduction, Crypto, Crypto Basics, Symmetric Key Crypto, Public Key Crypto, Hash Functions++, Advanced Cryptanalysis, Access Control, Authentication, Authorization, Protocols, Simple Authentication Protocols, Real-World Security Protocols, Software, Software Flaws and Malware, Insecurity in Software, Operating Systems and Security, Appendix, Annotated Bibliography, Index.
9780470636399