skip to content
Information security : principles and practice Preview this item
ClosePreview this item
Checking...

Information security : principles and practice

Author: Mark Stamp
Publisher: Hoboken, N.J. : Wiley, ©2011.
Edition/Format:   eBook : Document : English : 2nd edView all editions and formats
Database:WorldCat
Summary:
"Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Stamp, Mark.
Information security.
Hoboken, N.J. : Wiley, ©2011
(DLC) 2010045221
(OCoLC)671491825
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Mark Stamp
ISBN: 9781118027950 1118027957 9781118027974 1118027973 9781118027967 1118027965
OCLC Number: 748365383
Description: 1 online resource (xxi, 584 pages) : illustrations
Contents: Front Matter --
Introduction --
Crypto. Crypto Basics --
Symmetric Key Crypto --
Public Key Crypto --
Hash Functions++ --
Advanced Cryptanalysis --
Access Control. Authentication --
Authorization --
Protocols. Simple Authentication Protocols --
Real-World Security Protocols --
Software. Software Flaws and Malware --
Insecurity in Software --
Operating Systems and Security --
Appendix: A-1 Network Security Basics --
Appendix: A-2 Math Essentials --
Annotated Bibliography --
Index.
Responsibility: Mark Stamp.

Abstract:

Now updated your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex  Read more...

Reviews

Editorial reviews

Publisher Synopsis

'This book covers four main themes: cryptography; access control; protocols and software: whilst primarily a university textbook, it contains much that is of value to the working IT professional.' Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/748365383> # Information security : principles and practice
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
   library:oclcnum "748365383" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/116905661#Place/hoboken_n_j> ; # Hoboken, N.J.
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/informatiesystemen> ; # Informatiesystemen
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/computerbeveiliging> ; # Computerbeveiliging
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/electronic_books> ; # Electronic books
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/databescherming> ; # Databescherming
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/computernetwerken> ; # Computernetwerken
   schema:about <http://experiment.worldcat.org/entity/work/data/116905661#Topic/internet> ; # Internet
   schema:bookEdition "2nd ed." ;
   schema:bookFormat schema:EBook ;
   schema:copyrightYear "2011" ;
   schema:creator <http://viaf.org/viaf/166059631> ; # Mark Stamp
   schema:datePublished "2011" ;
   schema:description "Front Matter -- Introduction -- Crypto. Crypto Basics -- Symmetric Key Crypto -- Public Key Crypto -- Hash Functions++ -- Advanced Cryptanalysis -- Access Control. Authentication -- Authorization -- Protocols. Simple Authentication Protocols -- Real-World Security Protocols -- Software. Software Flaws and Malware -- Insecurity in Software -- Operating Systems and Security -- Appendix: A-1 Network Security Basics -- Appendix: A-2 Math Essentials -- Annotated Bibliography -- Index."@en ;
   schema:description ""Featuring a wide array of new information on the most current security topics, this book provides everything readers need to tackle any information security challenge. Focusing on cryptography, access control, protocols and software, this Second Edition features a greatly expanded set of homework problems; an appendix that covers necessary background information, like networking basics; a solutions manual and a comprehensive set of classroom-tested PowerPoint slides; and many new figures, tables, and graphs to clarify complex topics and problems. Students and instructors in information technology, computer science, and engineering, as well as professionals in these fields will depend on this text"--"@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/116905661> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/671491825> ;
   schema:name "Information security : principles and practice"@en ;
   schema:productID "748365383" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/748365383#PublicationEvent/hoboken_n_j_wiley_2011> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/116905661#Agent/wiley> ; # Wiley
   schema:url <http://catalogimages.wiley.com/images/db/jimages/9780470626399.jpg> ;
   schema:url <http://site.ebrary.com/id/10478419> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=738753> ;
   schema:url <http://www.calstate.eblib.com/patron/FullRecord.aspx?p=738753> ;
   schema:url <http://proquest.safaribooksonline.com/?fpi=9781118027967> ;
   schema:url <http://public.eblib.com/EBLPublic/PublicView.do?ptiID=738753> ;
   schema:url <http://iclibezp1.cc.ic.ac.uk/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781118027974> ;
   schema:url <http://proxy.library.cpp.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382074> ;
   schema:url <http://onlinelibrary.wiley.com/book/10.1002/9781118027974> ;
   schema:url <http://dx.doi.org/10.1002/9781118027974> ;
   schema:url <http://www.myilibrary.com?id=313887> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382074> ;
   schema:url <http://proquest.tech.safaribooksonline.de/9781118027967> ;
   schema:workExample <http://worldcat.org/isbn/9781118027950> ;
   schema:workExample <http://worldcat.org/isbn/9781118027967> ;
   schema:workExample <http://worldcat.org/isbn/9781118027974> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/748365383> ;
    .


Related Entities

<http://dx.doi.org/10.1002/9781118027974>
   rdfs:comment "An electronic book accessible through the World Wide Web; click for information" ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
   schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/116905661#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://onlinelibrary.wiley.com/book/10.1002/9781118027974>
   rdfs:comment "URL des Erstveröffentlichers" ;
    .

<http://proxy.library.cpp.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=382074>
   rdfs:comment "Connect to online resource: single user only. Cal Poly Pomona users only." ;
    .

<http://viaf.org/viaf/166059631> # Mark Stamp
    a schema:Person ;
   schema:familyName "Stamp" ;
   schema:givenName "Mark" ;
   schema:name "Mark Stamp" ;
    .

<http://worldcat.org/isbn/9781118027950>
    a schema:ProductModel ;
   schema:isbn "1118027957" ;
   schema:isbn "9781118027950" ;
    .

<http://worldcat.org/isbn/9781118027967>
    a schema:ProductModel ;
   schema:isbn "1118027965" ;
   schema:isbn "9781118027967" ;
    .

<http://worldcat.org/isbn/9781118027974>
    a schema:ProductModel ;
   schema:isbn "1118027973" ;
   schema:isbn "9781118027974" ;
    .

<http://www.calstate.eblib.com/patron/FullRecord.aspx?p=738753>
   rdfs:comment "Connect to online resource: unlimited concurrent users. Cal Poly Pomona users only" ;
    .

<http://www.worldcat.org/oclc/671491825>
    a schema:CreativeWork ;
   rdfs:label "Information security." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/748365383> ; # Information security : principles and practice
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.