Limit this search to....

A Multidisciplinary Introduction to Information Security
Contributor(s): Mjolsnes, Stig F. (Editor)
ISBN: 1420085905     ISBN-13: 9781420085907
Publisher: CRC Press
OUR PRICE:   $237.50  
Product Type: Hardcover - Other Formats
Published: November 2011
Qty:
Temporarily out of stock - Will ship within 2 to 5 weeks
Annotation:

The shift in communications from mail and telephone to email, web transactions, and more has created a demand for a variety of new specialists and expertise. This multidisciplinary book focuses on information and communication technology, security, and safety. It presents material on governmental regulations in cryptology and telecommunications as well as on privacy and biometrics. The book also includes thorough introductory coverage of software security and control, cryptography, secure protocols, network security, and digital forensics. Each chapter contains an introduction, main coverage of the topic, a summary of key terms and content, review problems, and suggested readings and websites.

Additional Information
BISAC Categories:
- Computers | Computer Engineering
- Computers | Networking - General
- Technology & Engineering | Electrical
Dewey: 005.8
LCCN: 2011039831
Series: Discrete Mathematics and Its Applications (Hardcover)
Physical Information: 0.9" H x 6.2" W x 9.3" (1.45 lbs) 348 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

With most services and products now being offered through digital communications, new challenges have emerged for information security specialists. A Multidisciplinary Introduction to Information Security presents a range of topics on the security, privacy, and safety of information and communication technology. It brings together methods in pure mathematics, computer and telecommunication sciences, and social sciences.

The book begins with the cryptographic algorithms of the Advanced Encryption Standard (AES) and Rivest, Shamir, and Adleman (RSA). It explains the mathematical reasoning behind public key cryptography and the properties of a cryptographic hash function before presenting the principles and examples of quantum cryptography. The text also describes the use of cryptographic primitives in the communication process, explains how a public key infrastructure can mitigate the problem of crypto-key distribution, and discusses the security problems of wireless network access. After examining past and present protection mechanisms in the global mobile telecommunication system, the book proposes a software engineering practice that prevents attacks and misuse of software. It then presents an evaluation method for ensuring security requirements of products and systems, covers methods and tools of digital forensics and computational forensics, and describes risk assessment as part of the larger activity of risk management. The final chapter focuses on information security from an organizational and people point of view.

As our ways of communicating and doing business continue to shift, information security professionals must find answers to evolving issues. Offering a starting point for more advanced work in the field, this volume addresses various security and privacy problems and solutions related to the latest information and communication technology.