Buch, Englisch, 867 Seiten, Format (B × H): 155 mm x 235 mm
Buch, Englisch, 867 Seiten, Format (B × H): 155 mm x 235 mm
ISBN: 978-3-642-04116-7
Verlag: Springer
The main sections of this Handbook are written from a general technological perspective and are applicable to most computer network and telecommunication systems. This presentation is complemented by an extensive description of applications in real implementations as well as legal and political aspects. The effect of having two editors ensures a well-balanced mix of American and European perspective, and electrical engineering and computer science views.
The Handbook offers comprehensive coverage of all practically relevant I & C security topics, including computers, computer networks, and telecommunications. An extensive section is devoted to applications. The content is mostly technical, but the Handbook deals also with legal and political aspects. The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Fundamentals and Cryptography.- A Framework for System Security.- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.- Intrusion Detection and Access Control.- Intrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in Grid Systems.- ECG-Based Authentication.- Networking.- Peer-to-Peer Botnets.- Security of Service Networks.- Network Traffic Analysis and SCADA Security.- Mobile Ad Hoc Network Routing.- Security for Ad Hoc Networks.- Phishing Attacks and Countermeasures.- Optical Networking.- Chaos-Based Secure Optical Communications Using Semiconductor Lasers.- Chaos Applications in Optical Communications.- Wireless Networking.- Security in Wireless Sensor Networks.- Secure Routing in Wireless Sensor Networks.- Security via Surveillance and Monitoring.- Security and Quality of Service in Wireless Networks.- Software.- Low-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.- Forensics and Legal Issues.- Fundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CIS.