|
The book is broken down into four major sections: Cryptography: The author covers classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers and information hiding. Also, cryptanalytic techniques, including examples of attacks on cipher systems. Access Control: Focuses on authentication and authorization, password-based security, ACLs... Moreand capabilities, multilevel and multilateral security, covert channels and inference control, coverage of security models such as BLP and Biba`s Model, discussion of firewalls and intrusion detection systems (IDS). Prototcols: Focuses on generic authentication protocols and real-world security protocols, such as SSL, IPSec, Kerberos and GSM. Software: Discusses software flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering (SRE), digital rights management (DRM), secure software development, and operating systems security functions, including discussion on Microsoft`s "next generation secure computing base" or NGSCB. Table of contents : Preface About The Author Acknowledgments · Introduction · Crypto · Access Control · Protocols · Software Appendices A-1 Networking Basics A-11 Introduction A-12 The Protocol Stack A-13 Application Layer A-14 Transport Layer A-15 Network Layer A-16 Link Layer A-17 Conclusions A-2 Math Essentials A-21 Modular Arithmetic A-22 Permutations A-23 Probability A-24 Linear Algebra A-3 DES S-boxes Annotated Bibliography Index Market Description : · Students of information technology, computer science, and engineering About Author : Dr. Mark Stamp is currently a professor of computer science at San Jose State University. Since arriving at SJSU, he has taught a graduate level security course every semester. The author also has more than seven years of experience working at the National Security Agency. ISBN : 9788126507696
|
|
Pages : 390
|