Stavroulakis / Stamp | Handbook of Information and Communication Security | Buch | 978-3-642-04116-7 | sack.de

Buch, Englisch, 867 Seiten, Format (B × H): 155 mm x 235 mm

Stavroulakis / Stamp

Handbook of Information and Communication Security


1. Auflage. 2010
ISBN: 978-3-642-04116-7
Verlag: Springer

Buch, Englisch, 867 Seiten, Format (B × H): 155 mm x 235 mm

ISBN: 978-3-642-04116-7
Verlag: Springer


The main sections of this Handbook are written from a general technological perspective and are applicable to most computer network and telecommunication systems. This presentation is complemented by an extensive description of applications in real implementations as well as legal and political aspects. The effect of having two editors ensures a well-balanced mix of American and European perspective, and electrical engineering and computer science views.

The Handbook offers comprehensive coverage of all practically relevant I & C security topics, including computers, computer networks, and telecommunications. An extensive section is devoted to applications. The content is mostly technical, but the Handbook deals also with legal and political aspects. The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.

Stavroulakis / Stamp Handbook of Information and Communication Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Fundamentals and Cryptography.- A Framework for System Security.- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.- Intrusion Detection and Access Control.- Intrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in Grid Systems.- ECG-Based Authentication.- Networking.- Peer-to-Peer Botnets.- Security of Service Networks.- Network Traffic Analysis and SCADA Security.- Mobile Ad Hoc Network Routing.- Security for Ad Hoc Networks.- Phishing Attacks and Countermeasures.- Optical Networking.- Chaos-Based Secure Optical Communications Using Semiconductor Lasers.- Chaos Applications in Optical Communications.- Wireless Networking.- Security in Wireless Sensor Networks.- Secure Routing in Wireless Sensor Networks.- Security via Surveillance and Monitoring.- Security and Quality of Service in Wireless Networks.- Software.- Low-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.- Forensics and Legal Issues.- Fundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CIS.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.