| 000 | 02424cam a22003858i 4500 | ||
|---|---|---|---|
| 001 | 22101755 | ||
| 003 | n | ||
| 005 | 20250929135814.0 | ||
| 008 | 210625s2022 nju b 001 0 eng | ||
| 010 | _a 2021031566 | ||
| 020 |
_a9781119505907 _q(hardback) |
||
| 020 |
_z9781119505891 _q(adobe pdf) |
||
| 020 |
_z9781119505884 _q(epub) |
||
| 035 | _a22101755 | ||
| 040 |
_aDLC _beng _erda _cDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bS69 2022 |
| 082 | 0 | 0 |
_a005.8 S69 2022 _223 |
| 100 | 1 |
_aStamp, Mark, _eauthor. |
|
| 245 | 1 | 0 |
_aInformation security : _bprinciples and practice / _cMark Stamp, San Jose State University, San Jose, California. |
| 250 | _aThird edition. | ||
| 263 | _a2111 | ||
| 264 | 1 |
_aHoboken, NJ : _bWiley, _c2022. |
|
| 300 | _a430 pages 23 cm. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis. Experts must also use access control techniques like authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control. Among the various protocols used in information security are simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM. Software can create problems including flaws and malware, buffer overflows, viruses and worms, and also solve them using tools such as malware detection, digital rights management, secure software development, and operating systems security"-- _cProvided by publisher. |
||
| 650 | 0 | _aComputer security. | |
| 776 | 0 | 8 |
_iOnline version: _aStamp, Mark. _tInformation security _bThird edition. _dHoboken, NJ : Wiley, 2022 _z9781119505891 _w(DLC) 2021031567 |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK-EN _n0 |
||
| 999 |
_c7946 _d7946 |
||