skip to content
Information security : principles and practice Preview this item
ClosePreview this item
Checking...

Information security : principles and practice

Author: Mark Stamp
Publisher: Hoboken, N.J. : Wiley-Interscience, ©2006.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Online version:
Stamp, Mark.
Information security.
Hoboken, N.J. : Wiley-Interscience, ©2006
(OCoLC)606165720
Online version:
Stamp, Mark.
Information security.
Hoboken, N.J. : Wiley-Interscience, ©2006
(OCoLC)607681727
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Mark Stamp
ISBN: 0471738484 9780471738480
OCLC Number: 57754240
Description: xxi, 390 pages : illustrations ; 25 cm
Contents: Crypto basics --
Symmetric key crypto --
Public key crypto --
Hash functions and other topics --
Advanced cryptanalysis --
Authentication --
Authorization --
Simple authentication protocols --
Real-world security protocols --
Software flaws and malware --
Insecurity in software --
Operating systems and security.
Responsibility: Mark Stamp.
More information:

Abstract:

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"...presents information security concepts and practices insightfully in an easily comprehensible style...Although primarily intended as a college course resource, this book will appeal also to many Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/57754240> # Information security : principles and practice
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "57754240" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/116905661#Place/hoboken_n_j> ; # Hoboken, N.J.
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/informatiesystemen> ; # Informatiesystemen
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/cryptographie> ; # Cryptographie
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/kryptologie> ; # Kryptologie
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/kommunikationsprotokoll> ; # Kommunikationsprotokoll
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/ordinateurs_acces_controle> ; # Ordinateurs--Accès--Contrôle
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/malware> ; # Malware
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/datensicherung> ; # Datensicherung
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/zugriffskontrolle> ; # Zugriffskontrolle
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/protocoles_de_reseaux_d_ordinateurs_securite_mesures> ; # Protocoles de réseaux d'ordinateurs--Sécurité--Mesures
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/databescherming> ; # Databescherming
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/logiciels_protection> ; # Logiciels--Protection
    schema:bookFormat bgn:PrintBook ;
    schema:copyrightYear "2006" ;
    schema:creator <http://viaf.org/viaf/166059631> ; # Mark Stamp
    schema:datePublished "2006" ;
    schema:description "Crypto basics -- Symmetric key crypto -- Public key crypto -- Hash functions and other topics -- Advanced cryptanalysis -- Authentication -- Authorization -- Simple authentication protocols -- Real-world security protocols -- Software flaws and malware -- Insecurity in software -- Operating systems and security."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/116905661> ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/607681727> ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/606165720> ;
    schema:name "Information security : principles and practice"@en ;
    schema:productID "57754240" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/57754240#PublicationEvent/hoboken_n_j_wiley_interscience_2006> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/116905661#Agent/wiley_interscience> ; # Wiley-Interscience
    schema:reviews <http://www.worldcat.org/title/-/oclc/57754240#Review/-519578147> ;
    schema:url <http://catdir.loc.gov/catdir/toc/ecip058/2005005152.html> ;
    schema:workExample <http://worldcat.org/isbn/9780471738480> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA560653> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/57754240> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/116905661#Agent/wiley_interscience> # Wiley-Interscience
    a bgn:Agent ;
    schema:name "Wiley-Interscience" ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Place/hoboken_n_j> # Hoboken, N.J.
    a schema:Place ;
    schema:name "Hoboken, N.J." ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/cryptographie> # Cryptographie
    a schema:Intangible ;
    schema:name "Cryptographie"@en ;
    schema:name "Cryptographie"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/informatiesystemen> # Informatiesystemen
    a schema:Intangible ;
    schema:name "Informatiesystemen"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/kommunikationsprotokoll> # Kommunikationsprotokoll
    a schema:Intangible ;
    schema:name "Kommunikationsprotokoll"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/logiciels_protection> # Logiciels--Protection
    a schema:Intangible ;
    schema:name "Logiciels--Protection"@en ;
    schema:name "Logiciels--Protection"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/ordinateurs_acces_controle> # Ordinateurs--Accès--Contrôle
    a schema:Intangible ;
    schema:name "Ordinateurs--Accès--Contrôle"@en ;
    schema:name "Ordinateurs--Accès--Contrôle"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/protocoles_de_reseaux_d_ordinateurs_securite_mesures> # Protocoles de réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
    schema:name "Protocoles de réseaux d'ordinateurs--Sécurité--Mesures"@en ;
    schema:name "Protocoles de réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/zugriffskontrolle> # Zugriffskontrolle
    a schema:Intangible ;
    schema:name "Zugriffskontrolle"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/166059631> # Mark Stamp
    a schema:Person ;
    schema:familyName "Stamp" ;
    schema:givenName "Mark" ;
    schema:name "Mark Stamp" ;
    .

<http://worldcat.org/isbn/9780471738480>
    a schema:ProductModel ;
    schema:isbn "0471738484" ;
    schema:isbn "9780471738480" ;
    .

<http://www.worldcat.org/oclc/606165720>
    a schema:CreativeWork ;
    rdfs:label "Information security." ;
    schema:description "Online version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/57754240> ; # Information security : principles and practice
    .

<http://www.worldcat.org/oclc/607681727>
    a schema:CreativeWork ;
    rdfs:label "Information security." ;
    schema:description "Online version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/57754240> ; # Information security : principles and practice
    .

<http://www.worldcat.org/title/-/oclc/57754240#Review/-519578147>
    a schema:Review ;
    schema:itemReviewed <http://www.worldcat.org/oclc/57754240> ; # Information security : principles and practice
    schema:reviewBody ""As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.