Für diesen Artikel ist leider kein Bild verfügbar.

Securing Information and Communications Systems

Principles, Technologies, and Applications
Buch | Hardcover
290 Seiten
2008
Artech House Publishers (Verlag)
978-1-59693-228-9 (ISBN)
149,70 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Slamming the door on security threats just got easier for IT professionals. This resource on security design and operations puts tools and techniques at their command, providing the expertise on things from access control to privacy enhancement.
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens.

Javier Lopez is an associate professor in the Computer Science Department and coordinator of the Information Security Research Group at the University of Malaga, Spain. Steven Furnell is head of the Network Research Group at the University of Plymouth, United Kingdom, and an adjunct associate professor at Edith Cowan University, Australia. Sokratis Katsikas is the rector at the University of the Aegean, Greece, where he is also a professor in the Department of Information & Communication Systems Engineering. Ahmed Patel is a consultant and lecturer in computer networks, distributed systems and computer forensics.

Introduction; Security Concepts, Services and Threats; Business-Integrated Information Security Management; User Authentication Technologies; Authorization and Access Control; Data Centric Applications; Modern Cryptology; Network Security; Standard Public Key and Privilege Management Infrastructures; Smart Cards and Tokens; Privacy and Privacy-Enhancing Technologies (PETs); Content Filtering Technologies and the Law; Model for Cybercrime Investigation; Systemic Holistic Approach to IT Security; Electronic Voting Systems; On Mobile Wiki Systems Security; Author's Biographies.

Erscheint lt. Verlag 3.6.2008
Zusatzinfo Illustrations
Verlagsort Norwood
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-10 1-59693-228-7 / 1596932287
ISBN-13 978-1-59693-228-9 / 9781596932289
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich