Handbook of Information and Communication Security -

Handbook of Information and Communication Security

Buch | Softcover
XVI, 867 Seiten
2014 | 2010
Springer Berlin (Verlag)
978-3-642-44459-3 (ISBN)
384,13 inkl. MwSt
The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.

The main sections of this Handbook are written from a general technological perspective and are applicable to most computer network and telecommunication systems. This presentation is complemented by an extensive description of applications in real implementations as well as legal and political aspects. The effect of having two editors ensures a well-balanced mix of American and European perspective, and electrical engineering and computer science views. The Handbook offers comprehensive coverage of all practically relevant I & C security topics, including computers, computer networks, and telecommunications. An extensive section is devoted to applications. The content is mostly technical, but the Handbook deals also with legal and political aspects. The Springer Handbook of Information and Communication security provides I & C professionals, researchers as well as students with quickly retrievable information on relevant security topics.

Part A Fundamentals and CryptographyA Framework for System Security .- Public-Key Cryptography.- Elliptic Curve Cryptography.- Cryptographic Hash Functions.- Block Cipher Cryptanalysis.- Chaos-Based Information Security.- Bio-Cryptography.- Quantum Cryptography.-Part B Intrusion Detection and Access ControlIntrusion Detection and Prevention Systems.- Intrusion Detection Systems.- Intranet Security via Firewalls.- Distributed Port Scan Detection.- Host-Based Anomaly Intrusion Detection.- Security in Relational Databases.- Anti-Bot Strategies Based on Human Interactive Proofs.- Access and Usage Control in GRID Systems.- Secure Human Identification.-Part C NetworkingPeer-to-Peer Botnets.- Security of Service Networks.- SCADA Security.- Mobile Ad-Hoc Network Routing.- Security Approach for Ad-Hoc Networks.- Phishing: Attacks and Countermeasures´.-Part D Optical NetworkingChaos-Based Secure Optical Communications.- Chaos Applications in Optical Communications.-Part E Wireless NetworkingSecurity in Wireless Sensor Networks.- Secure routing in Wireless Sensor Networks.- Security Via Surveillance and Monitoring.- Security and QoS in Wireless Networks.-Part F SoftwareLow-Level Software Security by Example.- Software Reverse Engineering.- Trusted Computing.- Security via Trusted Communications.- Viruses and Malware.- Designing a Secure Programming Language.-Part G Forensics and Legal IssuesFundamentals of Digital Forensic Evidence.- Multimedia Forensics for Detecting Forgeries.- Technological and Legal Aspects of CISSubject Index

Aus den Rezensionen: "... Besonderes Augenmerk gilt dabei dem Wechselspiel zwischen Kommunikation und dem Bereich der Informationssicherheit. ... herausgegriffene Themen illustrieren die Relevanz des Buchs. ... Verschiedene HIPs werden vorgestellt und verglichen Weitere Beitrage befassen sich mit Phishing Attacken bzw mit Authentifikationen mittels biometrischer Methoden. ... Die Beitrage sind theoretisch fundiert und oft praxisbezogen. ... Das Buch eignet sich deshalb gut als Einstiegslektüre für Studierende oder für Informatiker, die sich nur am Rande für die Sicherheitsthematik interessieren. Für Experten ist das Buch eine wertvolle, vielseitige Inspirationsquelle." (in: Bulletin electrosuisse, 2/July/2010, Issue 7, S. 121)

Aus den Rezensionen:

“... Besonderes Augenmerk gilt dabei dem Wechselspiel zwischen Kommunikation und dem Bereich der Informationssicherheit. ... herausgegriffene Themen illustrieren die Relevanz des Buchs. … Verschiedene HIPs werden vorgestellt und verglichen Weitere Beitrage befassen sich mit Phishing Attacken bzw mit Authentifikationen mittels biometrischer Methoden. ... Die Beitrage sind theoretisch fundiert und oft praxisbezogen. … Das Buch eignet sich deshalb gut als Einstiegslektüre für Studierende oder für Informatiker, die sich nur am Rande für die Sicherheitsthematik interessieren. Für Experten ist das Buch eine wertvolle, vielseitige Inspirationsquelle.“ (in: Bulletin electrosuisse, 2/July/2010, Issue 7, S. 121)

Erscheint lt. Verlag 23.11.2014
Zusatzinfo XVI, 867 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 1329 g
Themenwelt Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte ACCESS • Access (Software) • Communication • Database • Firewall • Information • Intrusion Detection • Monitoring • Quality of Service • Quality of Service (QoS) • Relational Database • Routing • security • wireless sensor networks
ISBN-10 3-642-44459-8 / 3642444598
ISBN-13 978-3-642-44459-3 / 9783642444593
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Wegweiser für Elektrofachkräfte

von Gerhard Kiefer; Herbert Schmolke; Karsten Callondann

Buch | Hardcover (2024)
VDE VERLAG
48,00