Information Security / Principles and Practice - 2nd - John Wiley & Sons, Ltd, 2011 - 588

This book features new discussions of relevant security topics such as the SSH and WEB protocols, practical RSA timing attacks, botnets and security certification. Preface, Acknowledgements, Introduction, Crypto, Crypto Basics, Symmetric Key Crypto, Public Key Crypto, Hash Functions++, Advanced Cryptanalysis, Access Control, Authentication, Authorization, Protocols, Simple Authentication Protocols, Real-World Security Protocols, Software, Software Flaws and Malware, Insecurity in Software, Operating Systems and Security, Appendix, Annotated Bibliography, Index.

9780470636399