Fundamentals of Computer Security [electronic resource] /
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
Main Authors: | , , , |
---|---|
Format: | Texto biblioteca |
Language: | eng |
Published: |
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,
2003
|
Subjects: | Computer science., Computer communication systems., Computer security., Data structures (Computer science)., Data encryption (Computer science)., Coding theory., Computer Science., Systems and Data Security., Data Structures, Cryptology and Information Theory., Data Encryption., Coding and Information Theory., Computer Communication Networks., |
Online Access: | http://dx.doi.org/10.1007/978-3-662-07324-7 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
KOHA-OAI-TEST:227370 |
---|---|
record_format |
koha |
spelling |
KOHA-OAI-TEST:2273702018-07-31T00:08:25ZFundamentals of Computer Security [electronic resource] / Pieprzyk, Josef. author. Hardjono, Thomas. author. Seberry, Jennifer. author. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,2003.engThis book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.1 Introduction -- 2 Background Theory -- 3 Private-Key Cryptosystems -- 4 Public-Key Cryptosystems -- 5 Pseudorandomness -- 6 Hashing -- 7 Digital Signatures -- 8 Authentication -- 9 Secret Sharing -- 10 Group-Oriented Cryptography -- 11 Key Establishment Protocols -- 12 Zero-Knowledge Proof Systems -- 13 Identification -- 14 Intrusion Detection -- 15 Electronic Elections and Digital Money -- 16 Database Protection and Security -- 17 Access Control -- 18 Network Security -- References.This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.Computer science.Computer communication systems.Computer security.Data structures (Computer science).Data encryption (Computer science).Coding theory.Computer Science.Systems and Data Security.Data Structures, Cryptology and Information Theory.Data Encryption.Coding and Information Theory.Computer Communication Networks.Springer eBookshttp://dx.doi.org/10.1007/978-3-662-07324-7URN:ISBN:9783662073247 |
institution |
COLPOS |
collection |
Koha |
country |
México |
countrycode |
MX |
component |
Bibliográfico |
access |
En linea En linea |
databasecode |
cat-colpos |
tag |
biblioteca |
region |
America del Norte |
libraryname |
Departamento de documentación y biblioteca de COLPOS |
language |
eng |
topic |
Computer science. Computer communication systems. Computer security. Data structures (Computer science). Data encryption (Computer science). Coding theory. Computer Science. Systems and Data Security. Data Structures, Cryptology and Information Theory. Data Encryption. Coding and Information Theory. Computer Communication Networks. Computer science. Computer communication systems. Computer security. Data structures (Computer science). Data encryption (Computer science). Coding theory. Computer Science. Systems and Data Security. Data Structures, Cryptology and Information Theory. Data Encryption. Coding and Information Theory. Computer Communication Networks. |
spellingShingle |
Computer science. Computer communication systems. Computer security. Data structures (Computer science). Data encryption (Computer science). Coding theory. Computer Science. Systems and Data Security. Data Structures, Cryptology and Information Theory. Data Encryption. Coding and Information Theory. Computer Communication Networks. Computer science. Computer communication systems. Computer security. Data structures (Computer science). Data encryption (Computer science). Coding theory. Computer Science. Systems and Data Security. Data Structures, Cryptology and Information Theory. Data Encryption. Coding and Information Theory. Computer Communication Networks. Pieprzyk, Josef. author. Hardjono, Thomas. author. Seberry, Jennifer. author. SpringerLink (Online service) Fundamentals of Computer Security [electronic resource] / |
description |
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material. |
format |
Texto |
topic_facet |
Computer science. Computer communication systems. Computer security. Data structures (Computer science). Data encryption (Computer science). Coding theory. Computer Science. Systems and Data Security. Data Structures, Cryptology and Information Theory. Data Encryption. Coding and Information Theory. Computer Communication Networks. |
author |
Pieprzyk, Josef. author. Hardjono, Thomas. author. Seberry, Jennifer. author. SpringerLink (Online service) |
author_facet |
Pieprzyk, Josef. author. Hardjono, Thomas. author. Seberry, Jennifer. author. SpringerLink (Online service) |
author_sort |
Pieprzyk, Josef. author. |
title |
Fundamentals of Computer Security [electronic resource] / |
title_short |
Fundamentals of Computer Security [electronic resource] / |
title_full |
Fundamentals of Computer Security [electronic resource] / |
title_fullStr |
Fundamentals of Computer Security [electronic resource] / |
title_full_unstemmed |
Fundamentals of Computer Security [electronic resource] / |
title_sort |
fundamentals of computer security [electronic resource] / |
publisher |
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, |
publishDate |
2003 |
url |
http://dx.doi.org/10.1007/978-3-662-07324-7 |
work_keys_str_mv |
AT pieprzykjosefauthor fundamentalsofcomputersecurityelectronicresource AT hardjonothomasauthor fundamentalsofcomputersecurityelectronicresource AT seberryjenniferauthor fundamentalsofcomputersecurityelectronicresource AT springerlinkonlineservice fundamentalsofcomputersecurityelectronicresource |
_version_ |
1756271111195066368 |