Fundamentals of computer security
Author(s)
Bibliographic Information
Fundamentals of computer security
Springer, c2010
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Printed by Books on Demand, Germany
Includes bibliographical references (p. [631]-664)
Description and Table of Contents
Description
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.
Table of Contents
1 Introduction.- 2 Background Theory.- 3 Private-Key Cryptosystems.- 4 Public-Key Cryptosystems.- 5 Pseudorandomness.- 6 Hashing.- 7 Digital Signatures.- 8 Authentication.- 9 Secret Sharing.- 10 Group-Oriented Cryptography.- 11 Key Establishment Protocols.- 12 Zero-Knowledge Proof Systems.- 13 Identification.- 14 Intrusion Detection.- 15 Electronic Elections and Digital Money.- 16 Database Protection and Security.- 17 Access Control.- 18 Network Security.- References.
by "Nielsen BookData"