Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Handbook of Information and Communication Security
Details
The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.
The main sections of this Handbook are written from a general technological perspective and are applicable to most computer network and telecommunication systems. This presentation is complemented by an extensive description of applications in real implementations as well as legal and political aspects. The effect of having two editors ensures a well-balanced mix of American and European perspective, and electrical engineering and computer science views.
The Handbook offers comprehensive coverage of all practically relevant I & C security topics, including computers, computer networks, and telecommunications. An extensive section is devoted to applications. The content is mostly technical, but the Handbook deals also with legal and political aspects. The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.
Comprehensive handbook on all practically relevant I C security topics Covers computers, computer networks, and telecommunications Contains an extensive applications part Mostly technical, but deals also with legal and political aspects Includes supplementary material: sn.pub/extras
Inhalt
Fundamentals and Cryptography.- A Framework for System Security.- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.- Intrusion Detection and Access Control.- Intrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in Grid Systems.- ECG-Based Authentication.- Networking.- Peer-to-Peer Botnets.- Security of Service Networks.- Network Traffic Analysis and SCADA Security.- Mobile Ad Hoc Network Routing.- Security for Ad Hoc Networks.- Phishing Attacks and Countermeasures.- Optical Networking.- Chaos-Based Secure Optical Communications Using Semiconductor Lasers.- Chaos Applications in Optical Communications.- Wireless Networking.- Security in Wireless Sensor Networks.- Secure Routing in Wireless Sensor Networks.- Security via Surveillance and Monitoring.- Security and Quality of Service in Wireless Networks.- Software.- Low-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.- Forensics and Legal Issues.- Fundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CIS.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09783642444593
- Genre Elektrotechnik
- Auflage 2010
- Editor Mark Stamp, Peter Stavroulakis
- Sprache Englisch
- Lesemotiv Verstehen
- Anzahl Seiten 884
- Größe H235mm x B155mm x T48mm
- Jahr 2014
- EAN 9783642444593
- Format Kartonierter Einband
- ISBN 3642444598
- Veröffentlichung 23.11.2014
- Titel Handbook of Information and Communication Security
- Gewicht 1311g
- Herausgeber Springer Berlin Heidelberg