libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

pieprzyk josef; hardjono thomas; seberry jennifer - fundamentals of computer security

Fundamentals of Computer Security

; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
61,98 €
NICEPRICE
58,88 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 12/2010
Edizione: Softcover reprint of hardcover 1st ed. 2003





Trama

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.




Sommario

1 Introduction.- 2 Background Theory.- 3 Private-Key Cryptosystems.- 4 Public-Key Cryptosystems.- 5 Pseudorandomness.- 6 Hashing.- 7 Digital Signatures.- 8 Authentication.- 9 Secret Sharing.- 10 Group-Oriented Cryptography.- 11 Key Establishment Protocols.- 12 Zero-Knowledge Proof Systems.- 13 Identification.- 14 Intrusion Detection.- 15 Electronic Elections and Digital Money.- 16 Database Protection and Security.- 17 Access Control.- 18 Network Security.- References.










Altre Informazioni

ISBN:

9783642077135

Condizione: Nuovo
Dimensioni: 244 x 170 mm
Formato: Brossura
Illustration Notes:XX, 677 p.
Pagine Arabe: 677
Pagine Romane: xx


Dicono di noi