Handbook of Information and Communication Security
AvPeter Stavroulakis,Mark Stamp
4 147 kr
Beställningsvara. Skickas inom 10-15 vardagar. Fri frakt över 249 kr.
Beskrivning
Produktinformation
- Utgivningsdatum:2014-11-23
- Mått:155 x 235 x 48 mm
- Vikt:1 311 g
- Format:Häftad
- Språk:Engelska
- Antal sidor:867
- Förlag:Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
- ISBN:9783642444593
Utforska kategorier
Recensioner i media
Aus den Rezensionen: "... Besonderes Augenmerk gilt dabei dem Wechselspiel zwischen Kommunikation und dem Bereich der Informationssicherheit. ... herausgegriffene Themen illustrieren die Relevanz des Buchs. ... Verschiedene HIPs werden vorgestellt und verglichen Weitere Beitrage befassen sich mit Phishing Attacken bzw mit Authentifikationen mittels biometrischer Methoden. ... Die Beitrage sind theoretisch fundiert und oft praxisbezogen. ... Das Buch eignet sich deshalb gut als Einstiegslekture fur Studierende oder fur Informatiker, die sich nur am Rande fur die Sicherheitsthematik interessieren. Fur Experten ist das Buch eine wertvolle, vielseitige Inspirationsquelle." (in: Bulletin electrosuisse, 2/July/2010, Issue 7, S. 121)
Innehållsförteckning
- Fundamentals and Cryptography.- A Framework for System Security.- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.- Intrusion Detection and Access Control.- Intrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in Grid Systems.- ECG-Based Authentication.- Networking.- Peer-to-Peer Botnets.- Security of Service Networks.- Network Traffic Analysis and SCADA Security.- Mobile Ad Hoc Network Routing.- Security for Ad Hoc Networks.- Phishing Attacks and Countermeasures.- Optical Networking.- Chaos-Based Secure Optical Communications Using Semiconductor Lasers.- Chaos Applications in Optical Communications.- Wireless Networking.- Security in Wireless Sensor Networks.- Secure Routing in Wireless Sensor Networks.- Security via Surveillance and Monitoring.- Security and Quality of Service in Wireless Networks.- Software.- Low-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.- Forensics and Legal Issues.- Fundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CIS.
Du kanske också är intresserad av
Malware Analysis Using Artificial Intelligence and Deep Learning
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
1 980 kr
Malware Analysis Using Artificial Intelligence and Deep Learning
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
1 980 kr
Research Anthology on Business Strategies, Health Factors, and Ethical Implications in Sports and eSports, VOL 2
Information Reso Management Association
4 147 kr
Research Anthology on Business Strategies, Health Factors, and Ethical Implications in Sports and eSports, VOL 1
Information Reso Management Association
4 147 kr
Artificial Intelligence for Cybersecurity
Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo, Fabio Di Troia
1 871 kr