Information Security
Home > Computing and Information Technology > Computer security > Data encryption > Information Security: Principles and Practice
Information Security: Principles and Practice

Information Security: Principles and Practice


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

Table of Contents:
Preface. About The Author. Acknowledgments. 1. Introduction. 1.1 The Cast of Characters. 1.2 Alice's Online Bank. 1.2.1 Confidentiality, Integrity and. 1.2.2 Beyond CIA. 1.3 About This Book. 1.3.1 Cryptography. 1.3.2 Access Control. 1.3.3 Protocols. 1.3.4 Software. 1.4 The People Problem. 1.5 Theory and Practice. 1.6 Problems. I. CRYPTO. 2. Crypto Basics. 2.1 Introduction. 2.2 How to Speak Crypto. 2.3 Classic Crypto. 2.3.1 Simple Substitution Cipher. 2.3.2 Cryptanalysis of a Simple Substitution. 2.3.3 Definition of Secure. 2.3.4 Double Transposition Cipher. 2.3.5 One-time Pad. 2.3.6 Project VENONA. 2.3.7 Codebook Cipher. 2.3.8 Ciphers of the Election of 1876. 2.4 Modern Crypto History. 2.5 A Taxonomy of Cryptography. 2.6 A Taxonomy of Cryptanalysis. 2.7 Summary. 2.8 Problems. 3. Symmetric Key Crypto. 3.1 Introduction. 3.2 Stream Ciphers. 3.2.1 A5/1. 3.2.2 RC4. 3.3 Block Ciphers. 3.3.1 Feistel Cipher. 3.3.2 DES. 3.3.3 Triple DES. 3.3.4 AES. 3.3.5 Three More Block Ciphers. 3.3.6 TEA. 3.3.7 Block Cipher Modes. 3.4 Integrity. 3.5 Summary. 3.6 Problems. 4. Public Key Crypto. 4.1 Introduction. 4.2 Knapsack. 4.3 RSA. 4.3.1 RSA Example. 4.3.2 Repeated Squaring. 4.3.3 Speeding Up RSA. 4.4 Diffie-Hellman. 4.5 Elliptic Curve Cryptography. 4.5.1 Elliptic Curve Math. 4.5.2 ECC Diffie-Hellman. 4.6 Public Key Notation. 4.7 Uses for Public Key Crypto. 4.7.1 Confidentiality in the Real World. 4.7.2 Signatures and Non-repudiation. 4.7.3 Confidentiality and Non-repudiation. 4.8 Public Key Infrastructure. 4.9 Summary. 4.10 Problems. 5. Hash Functions and Other Topics. 5.1 What is a Hash Function? 5.2 The Birthday Problem. 5.3 Non-cryptographic Hashes. 5.4 Tiger Hash. 5.5 HMAC. 5.6 Uses of Hash Functions. 5.6.1 Online Bids. 5.6.2 Spam Reduction. 5.7 Other Crypto-Related Topics. 5.7.1 Secret Sharing. Key Escrow. 5.7.2 Random Numbers. Texas Hold 'em Poker. Generating Random Bits. 5.7.3 Information Hiding. 5.8 Summary. 5.9 Problems. 6. Advanced Cryptanalysis. 6.1 Introduction. 6.2 Linear and Differential Cryptanalysis. 6.2.1 Quick Review of DES. 6.2.2 Overview of Differential Cryptanalysis. 6.2.3 Overview of Linear Cryptanalysis. 6.2.4 Tiny DES. 6.2.5 Differential Cryptanalysis of TDES. 6.2.6 Linear Cryptanalysis of TDES. 6.2.7 Block Cipher Design. 6.3 Side Channel Attack on RSA. 6.4 Lattice Reduction and the Knapsack. 6.5 Hellman's Time-Memory Tradeo_. 6.5.1 Popcnt. 6.5.2 Cryptanalytic TMTO. 6.5.3 Misbehaving Chains. 6.5.4 Success Probability. 6.6 Summary. 6.7 Problems. II. ACCESS CONTROL. 7. Authentication. 7.1 Introduction. 7.2 Authentication Methods. 7.3 Passwords. 7.3.1 Keys versus Passwords. 7.3.2 Choosing Passwords. 7.3.3 Attacking Systems via Passwords. 7.3.4 Password Verification. 7.3.5 Math of Password Cracking. 7.3.6 Other Password Issues. 7.4 Biometrics. 7.4.1 Types of Errors. 7.4.2 Biometric Examples. Fingerprints. Hand Geometry. Iris Scan. 7.4.3 Biometric Error Rates. 7.4.4 Biometric Conclusions. 7.5 Something You Have. 7.6 Two-Factor Authentication. 7.7 Single Sign-On and Web Cookies. 7.8 Summary. 7.9 Problems. 8. Authorization. 8.1 Introduction. 8.2 Access Control. 8.2.1 ACLs and Capabilities. 8.2.2 Confused Deputy. 8.3 Multilevel Security Models. 8.3.1 Bell-LaPadula. 8.3.2 Biba's Model. 8.4 Multilateral Security. 8.5 Covert Channel. 8.6 Inference Control. 8.7 CAPTCHA. 8.8 Firewalls. 8.8.1 Packet Filter. 8.8.2 Stateful Packet Filter. 8.8.3 Application Proxy. 8.8.4 Personal Firewall. 8.8.5 Defense in Depth. 8.9 Intrusion Detection. 8.9.1 Signature-based IDS. 8.9.2 Anomaly-based IDS. 8.10 Summary. 8.11 Problems. III PROTOCOLS. 9. Simple Authentication Protocols. 9.1 Introduction. 9.2 Simple Security Protocols. 9.3 Authentication Protocols. 9.3.1 Authentication Using Symmetric Keys. 9.3.2 Authentication Using Public Keys. 9.3.3 Session Keys. 9.3.4 Perfect Forward Secrecy. 9.3.5 Mutual Authentication, Session Key and PFS. 9.3.6 Timestamps. 9.4 Authentication and TCP. 9.5 Zero Knowledge Proofs. 9.6 The Best Authentication Protocol? 9.7 Summary. 9.8 Problems. 10. Real-World Security Protocols. 10.1 Introduction. 10.2 Secure Socket Layer. 10.2.1 SSL and the Man-in-the-Middle. 10.2.2 SSL Connections. 10.2.3 SSL versus IPSec. 10.3 IPSec. 10.3.1 IKE Phase 1: Digital Signature. 10.3.2 IKE Phase 1: Symmetric Key. 10.3.3 IKE Phase 1: Public Key Encryption. 10.3.4 IPSec Cookies. 10.3.5 IKE Phase 1 Summary. 10.3.6 IKE Phase 2. 10.3.7 IPSec and IP Datagrams. 10.3.8 Transport and Tunnel Modes. 10.3.9 ESP and AH. 10.4 Kerberos. 10.4.1 Kerberized Login. 10.4.2 Kerberos Ticket. 10.4.3 Kerberos Security. 10.5 GSM. 10.5.1 GSM Architecture. 10.5.2 GSM Security Architecture. Anonymity. Authentication. Confidentiality. 10.5.3 GSM Authentication Protocol. 10.5.4 GSM Security Flaws. Crypto Flaws. Invalid Assumptions. SIM Attacks. Fake Base Station. 10.5.5 GSM Conclusions. 10.5.6 3GPP. 10.6 Summary. 10.7 Problems. IV SOFTWARE. 11. Software Flaws and Malware. 11.1 Introduction. 11.2 Software Flaws. 11.2.1 Buffer Overflow. Buffer Overflow Example. Stack Smashing Prevention. Buffer Overflow: The Last Word. 11.2.2 Incomplete Mediation. 11.2.3 Race Conditions. 11.3 Malware. 11.3.1 Brain. 11.3.2 Morris Worm. 11.3.3 Code Red. 11.3.4 SQL Slammer. 11.3.5 Trojan Example. 11.3.6 Malware Detection. Signature Detection. Change Detection. Anomaly Detection. 11.3.7 The Future of Malware. 11.3.8 Cyber Diseases versus Biological Diseases. 11.4 Miscellaneous Software-Based Attacks. 11.4.1 Salami Attacks. 11.4.2 Linearization Attacks. 11.4.3 Time Bombs. 11.4.4 Trusting Software. 11.5 Summary. 11.6 Problems. 12. Insecurity in Software. 12.1 Introduction. 12.2 Software Reverse Engineering. 12.2.1 Anti-disassembly Techniques. 12.2.2 Anti-debugging Techniques. 12.3 Software Tamper-resistance. 12.3.1 Guards. 12.3.2 Obfuscation. 12.3.3 Metamorphism Revisited. 12.4 Digital Rights Management. 12.4.1 What is DRM? 12.4.2 A Real-World DRM System. 12.4.3 DRM for Streaming Media. 12.4.4 DRM for a P2P Application. 12.4.5 DRM in the Enterprise. 12.4.6 DRM Failures. 12.4.7 DRM Conclusions. 12.5 Software Development. 12.5.1 Open versus Closed Source Software. 12.5.2 Finding Flaws. 12.5.3 Other Software Development Issues. 12.6 Summary. 12.7 Problems. 13. Operating Systems and Security. 13.1 Introduction. 13.2 Operating System Security Functions. 13.2.1 Separation. 13.2.2 Memory Protection. 13.2.3 Access Control. 13.3 Trusted Operating System. 13.3.1 MAC, DAC and More. 13.3.2 Trusted Path. 13.3.3 Trusted Computing Base. 13.4 Next Generation Secure Computing Base. 13.4.1 NGSCB Feature Groups. Process Isolation. Sealed Storage. Secure Path. Attestation. 13.4.2 NGSCB Compelling Applications. 13.4.3 Criticisms of NGSCB. 13.5 Summary. 13.6 Problems. Appendices. A-1 Networking Basics. A-1.1 Introduction. A-1.2 The Protocol Stack. A-1.3 Application Layer. A-1.4 Transport Layer. A-1.5 Network Layer. A-1.6 Link Layer. A-1.7 Conclusions. A-2 Math Essentials. A-2.1 Modular Arithmetic. A-2.2 Permutations. A-2.3 Probability. A-2.4 Linear Algebra. A-3 DES S-boxes. Annotated Bibliography. Index.

About the Author :
MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.

Review :
"…presents information security concepts and practices insightfully in an easily comprehensible style…Although primarily intended as a college course resource, this book will appeal also to many security professionals. Highly recommended." (CHOICE, April 2006) "The book is well suited for beginners, and contains enough introductory material on a variety of topics." (Computing Reviews.com, January 9, 2006)


Best Sellers


Product Details
  • ISBN-13: 9780471744191
  • Binding: Digital online
  • No of Pages: 372
  • Weight: 10 gr
  • ISBN-10: 0471744190
  • Language: English
  • Sub Title: Principles and Practice


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Information Security: Principles and Practice
-
Information Security: Principles and Practice
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Information Security: Principles and Practice

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!