Fundamentals of Computer Security / Edition 1

Fundamentals of Computer Security / Edition 1

by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
     
 

View All Available Formats & Editions

ISBN-10: 3642077137

ISBN-13: 9783642077135

Pub. Date: 12/01/2010

Publisher: Springer Berlin Heidelberg

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography,

Overview

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment prools, zero-knowledge prools, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

Product Details

ISBN-13:
9783642077135
Publisher:
Springer Berlin Heidelberg
Publication date:
12/01/2010
Edition description:
Softcover reprint of hardcover 1st ed. 2003
Pages:
677
Product dimensions:
7.00(w) x 10.00(h) x 1.50(d)

Table of Contents

1 Introduction.- 2 Background Theory.- 3 Private-Key Cryptosystems.- 4 Public-Key Cryptosystems.- 5 Pseudorandomness.- 6 Hashing.- 7 Digital Signatures.- 8 Authentication.- 9 Secret Sharing.- 10 Group-Oriented Cryptography.- 11 Key Establishment Prools.- 12 Zero-Knowledge Proof Systems.- 13 Identification.- 14 Intrusion Detection.- 15 Electronic Elections and Digital Money.- 16 Database Protection and Security.- 17 Access Control.- 18 Network Security.- References.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >