logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

A Multidisciplinary Introduction to Information Security

A Multidisciplinary Introduction to Information Security (Hardcover)

Stig F. Mjolsnes (엮은이)
Chapman & Hall
502,250원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
411,840원 -18% 0원
20,600원
391,240원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

A Multidisciplinary Introduction to Information Security
eBook 미리보기

책 정보

· 제목 : A Multidisciplinary Introduction to Information Security (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9781420085907
· 쪽수 : 348쪽
· 출판일 : 2011-11-09

목차

Introduction, Stig F. Mjølsnes
Motivation
What Is Information Security?
Some Basic Concepts
A Synopsis of the Topics
Further Reading and Web Sites

Security Electronics, E.J. Aas and P.G. Kjeldsberg
Introduction
Examples of Security Electronics
Side Channel Attacks
Summary
Further Reading and Web Sites

Public Key Cryptography, S.O. Smalø
Introduction
Hash Functions and One Time Pads
Public Key Cryptography
RSA-Public Key Cryptography
RSA-Public Key Cryptography with Signature
Problem with Signatures
Receipt
Secret Sharing Based on Discrete Logarithm Problems
Further Reading

Cryptographic Hash Functions, D. Gligoroski
Introduction
Definition for Cryptographic Hash Function
Iterated Hash Functions
Most Popular Cryptographic Hash Function
Application of Cryptographic Hash Function
Further Reading and Web Sites

Quantum Cryptography, Dag Roar Hjelme, Lars Lydersen, and Vadim Makarov
Introduction
Quantum Bit
Quantum Copying
Quantum Key Distribution
Practical Quantum Cryptography
Technology
Applications
Summary
Further Reading and Web Sites

Cryptographic Protocols, Stig F. Mjølsnes
The Origins
Information Policies
Some Concepts
Protocol Failures
Heuristics
Tools for Automated Security Analysis
Further Reading and Web Sites

Public Key Distribution, Stig F. Mjølsnes
The Public Key Distribution Problem
Authenticity and Validity of Public Keys
The Notion of Public Key Certificates
Revocation
Public Key Infrastructure
Identity-Based Public Key
Further Reading and Web Sites

Wireless Network Access, Stig F. Mjølsnes and Martin Eian
Introduction
Wireless Local Area Networks
The 802.11 Security Mechanisms
Wired Equivalent Privacy
RSN with CCMP
Assumptions and Vulnerabilities
Summary
Further Reading and Web Sites

Mobile Security, Jan Audestad
The GSM Security
3G Architecture
Extent of Protection
Security Functions in the Authentication Center
Security Functions in the SGSN/RNC
Security Functions in the Mobile Terminal (USIM)
Encryption and Integrity
Anonymity
Example: Anonymous Roaming in a Mobile Network
Using GSM/3G Terminals as Authentication Tokens
Further Reading

A Lightweight Approach to Secure Software Engineering, Martin Gilje Jaatun, Jostein Jensen, Per Hakon Meland, and Inger Anne Tøndel
Introduction
Asset Identification
Security Requirements
Secure Software Design
Testing for Software Security
Summary
Further Reading and Web Sites

ICT Security Evaluation, S.J. Knapskog
Introduction
ISO/IEC 15408, Part 1/3 Evaluation Criteria for IT Security (CC)
Definition of Assurance
Building Confidence in the Evaluation Process
Organizing the Requirements in the CC
Assurance Elements
Functional Classes
Protection Profiles (PPs)
PP Registries
Definition of a Security Target (ST)
Evaluation of a ST
Evaluation Schemes
Evaluation Methodology
Conclusion

ICT and Forensic Science, Stig F. Mjølsnes and Svein Y. Willassen
ICT and Forensic Science
The Crime Scene
Forensic Science
Evidence
The Digital Investigation Process
Digital Evidence Extraction
Digital Evidence Analysis Techniques
Anti-Forensics
Further Reading and Web Sites

Risk Assessment, Stein Haugen
Risk Assessment in the Risk Management Process
Terminology
Main Elements of the Risk Assessment Process
Summary
Further Reading and Web Sites

Information Security Management?From Regulations to End-Users, Eirik Albrechtsen and Jan Hovden
A Risk Governance Framework Applied to Information Security
Regulations and Control
Information Security Management

Index

A Bibliography appears at the end of each chapter.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책