TY - BOOK AU - Stamp,Mark TI - Information security: principles and practice SN - 9780470626399 (hardback) U1 - 005.8 23 PY - 2011/// CY - Hoboken, NJ PB - Wiley KW - Computer security KW - COMPUTERS / Security / General N1 - CONTENTS INTRODUCTION the cast of characters Alice's online Bank about this book the people problem principle and practice problems CRYPTO Crypto basics introduction how to speak crypto classic crypto SYMMETRIC KEY CRYPTO Introduction Stream Ciphers Block Ciphers Integrity Summary Problems PUBLIC KEY CRYPTO Introduction Knapsack RSA Diffie-Hellman Elliptic Curve Cryptography Public key infrastructure Uses for public key crypto Public Key Infrastructure HASH FUNCTIONS++ Introduction what is a cryptographic hash function the birthday attack Non-cryptographic hash function? e.tc ADVANCED CRYPTANALYSIS Introduction Enigma RC4 as used in WEP Linear and differential cryptanalysis e.tc ACCESS CONTROL AUTHENTICATION introduction Authentication methods Passwords Biometrics Something you have e.tc AUTHORIZATION introduction a brief history of authorization access control matrix multilevel security models e.tc PROTOCOLS SIMPLE AUTHENTICATION PROTOCOLS introduction simple security protocols authentication protocols authentication and TCP e.tc REAL-WORLD SECURITY PROTOCOLS introduction SSH SSL IPSec e.tc SOFTWARE SOFTWARE FLWAS AND MALWARE introduction Software flaws malware botnets e.tc INSECURITY IN SOFTWARE Introduction Software reserve engineering Digital rights management e.tc OPERATING SYSTEMS AND SECURITY Introduction OS security functions Trusted operating system e.tc ; Includes bibliographical references (p. 531-571) and index p. 572-584 ER -