Handbook of Information and Communication Security / Edition 1 by Peter Stavroulakis | 9783642041167 | Hardcover | Barnes & Noble
Handbook of Information and Communication Security / Edition 1

Handbook of Information and Communication Security / Edition 1

by Peter Stavroulakis
     
 

ISBN-10: 3642041167

ISBN-13: 9783642041167

Pub. Date: 04/08/2010

Publisher: Springer Berlin Heidelberg

The Handbook of Information and Communication Security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors’ intention, with respect to the presentation and sequencing of the chapters,

Overview

The Handbook of Information and Communication Security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors’ intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics.

This handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for new material to cover in their security courses. In addition, the topics in this volume are highly relevant to the real world practice of information security, which should make this book a valuable resource for working IT professionals. This handbook will be a valuable resource for a diverse audience for many years to come.

Product Details

ISBN-13:
9783642041167
Publisher:
Springer Berlin Heidelberg
Publication date:
04/08/2010
Edition description:
2010
Pages:
867
Product dimensions:
6.10(w) x 9.25(h) x 0.06(d)

Table of Contents

Part A Fundamentals and Cryptography
A Framework for System Security .- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.-
Part B Intrusion Detection and Access Control
Intrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-Bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in GRID Systems.- Secure Human Identification.-
Part C Networking
Peer-to-Peer Botnets.- Security of Service Networks.- SCADA Security.- Mobile Ad-Hoc Network Routing.- Security Approach for Ad–Hoc Networks.- Phishing: Attacks and Countermeasures.-
Part D Optical Networking
Chaos-Based Secure Optical Communications.- Chaos Applications in Optical Communications.-
Part E Wireless Networking
Security in Wireless Sensor Networks.- Secure routing in Wireless Sensor Networks.- Security Via Surveillance and Monitoring.- Security and QoS in Wireless Networks.-
Part F Software
Low-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.-
Part G Forensics and Legal Issues
Fundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CIS
Subject Index

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >