A Multidisciplinary Introduction to Information Security: Discrete Mathematics and Its Applications
Editat de Stig F. Mjolsnesen Limba Engleză Paperback – 13 iun 2017
The book begins with the cryptographic algorithms of the Advanced Encryption Standard (AES) and Rivest, Shamir, and Adleman (RSA). It explains the mathematical reasoning behind public key cryptography and the properties of a cryptographic hash function before presenting the principles and examples of quantum cryptography. The text also describes the use of cryptographic primitives in the communication process, explains how a public key infrastructure can mitigate the problem of crypto-key distribution, and discusses the security problems of wireless network access. After examining past and present protection mechanisms in the global mobile telecommunication system, the book proposes a software engineering practice that prevents attacks and misuse of software. It then presents an evaluation method for ensuring security requirements of products and systems, covers methods and tools of digital forensics and computational forensics, and describes risk assessment as part of the larger activity of risk management. The final chapter focuses on information security from an organizational and people point of view.
As our ways of communicating and doing business continue to shift, information security professionals must find answers to evolving issues. Offering a starting point for more advanced work in the field, this volume addresses various security and privacy problems and solutions related to the latest information and communication technology.
Din seria Discrete Mathematics and Its Applications
- 8% Preț: 404.91 lei
- 8% Preț: 550.28 lei
- 20% Preț: 571.04 lei
- 8% Preț: 409.44 lei
- 9% Preț: 1497.66 lei
- 18% Preț: 784.12 lei
- 18% Preț: 1092.37 lei
- 15% Preț: 556.82 lei
- 20% Preț: 799.88 lei
- 18% Preț: 1126.20 lei
- 18% Preț: 718.18 lei
- 25% Preț: 1305.48 lei
- 26% Preț: 880.31 lei
- 18% Preț: 774.35 lei
- 15% Preț: 493.80 lei
- 15% Preț: 673.22 lei
- 20% Preț: 466.57 lei
- 26% Preț: 681.14 lei
- 15% Preț: 475.40 lei
- 26% Preț: 1181.53 lei
- 25% Preț: 1245.88 lei
- 22% Preț: 352.41 lei
- 15% Preț: 674.31 lei
- 25% Preț: 557.05 lei
- 20% Preț: 1624.73 lei
- 15% Preț: 672.13 lei
- 18% Preț: 1316.30 lei
- 31% Preț: 435.18 lei
- 15% Preț: 485.82 lei
- Preț: 459.90 lei
- 20% Preț: 1030.56 lei
- 8% Preț: 439.83 lei
- 20% Preț: 1374.85 lei
- 18% Preț: 1306.71 lei
- 25% Preț: 486.68 lei
- 25% Preț: 1232.12 lei
- 15% Preț: 657.86 lei
- 18% Preț: 771.24 lei
- 20% Preț: 816.24 lei
- 25% Preț: 601.99 lei
- 18% Preț: 831.09 lei
- 31% Preț: 1038.64 lei
- 31% Preț: 1175.56 lei
Preț: 407.72 lei
Preț vechi: 591.65 lei
-31% Nou
Puncte Express: 612
Preț estimativ în valută:
78.04€ • 81.11$ • 64.64£
78.04€ • 81.11$ • 64.64£
Carte tipărită la comandă
Livrare economică 04-18 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138112131
ISBN-10: 1138112135
Pagini: 348
Ilustrații: 83
Dimensiuni: 156 x 234 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Discrete Mathematics and Its Applications
ISBN-10: 1138112135
Pagini: 348
Ilustrații: 83
Dimensiuni: 156 x 234 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Discrete Mathematics and Its Applications
Public țintă
UndergraduateCuprins
Introduction. Security Electronics. Public Key Cryptography. Cryptographic Hash Functions. Quantum Cryptography. Cryptographic Protocols. Public Key Distribution. Wireless Network Access. Mobile Security. A Lightweight Approach to Secure Software Engineering. ICT Security Evaluation. ICT and Forensic Science. Risk Assessment. Information Security Management—From Regulations to End-Users. Index.
Notă biografică
Stig F. Mjølsnes is a professor in the Department of Telematics at the Norwegian University of Science and Technology. His research focuses on the development and application of cryptographic protocols and security models.
Descriere
Bringing together methods in pure mathematics, computer and telecommunication sciences, and social sciences, this book focuses on the security, privacy, and safety of information and communication technology. It begins with the basic components of hardware and algorithms, then covers integration and systems, and concludes with human factors in these systems. It discusses cryptography, hardware and software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management. Each chapter includes recommendations for further reading and websites that provide more in-depth information.