Interscience Information Security Principles

Category: Technical

Tag: Programming

Posted on 2007-10-31. By anonymous.


Some security textbooks offer a large dollop of dry useless theory. Reading one of these books is about as exciting as reading a calculus textbook. Other security books offer nothing but a collection of apparently unrelated facts, giving the impression that security is not really a coherent subject at all.

Then there are books that present the topic as ac ollection of high-level managerial platitudes. These books may have a place, but if your goal is to design and build secure systems, you’d better understand something about the underlying technology. Finally, some security books focus on the human factors in security. While it is certainly critical to understand the role that human nature plays in security, I would argue that a security engineer must have a solid understanding of the inherent strengths and weaknesses of the technology before the human factors can be fullyappreciated.

Information security is a huge topic, and unlike more established fields, it’s not clear what material should be included in a book like this, or how best to organize the selected material. I’ve chosen to organize this book around the following four major themes:

These themes are fairly elastic so that I can include what I consider to be the most significant material. For example, in my usage, access control includes the traditional topics of authentication and authorization, along with such non-traditional topics as firewalls and CAPTCHAs. The software theme is particularly flexible, including such diverse topics as secure software development, computer viruses, software reverse engineering, and operating systems.

Chapter 01 - Introduction
Chapter 02 - Crypto Basics
Chapter 03 - Symmetric Key Crypto
Chapter 04 - Public Key Crypto
Chapter 05 - Hash Function And Other Topics
Chapter 06 - Advanced Cryptanalysis
Chapter 07 - Authentication
Chapter 08 - Authorization
Chapter 09 - Simple Authentication Protocols
Chapter 10 - Real-World Security Protocols
Chapter 11 - Software Flaws And Malware
Chapter 12 - Insecurity In Software
Chapter 13 - Operating Systems And Security



Sponsored High Speed Downloads
5540 dl's @ 2127 KB/s
Download Now [Full Version]
7701 dl's @ 2436 KB/s
Download Link 1 - Fast Download
5889 dl's @ 2828 KB/s
Download Mirror - Direct Download

Search More...
Interscience Information Security Principles

Search free ebooks in!

Download this book

No active download links here?
Please check the description for download links if any or do a search to find alternative books.

Related Books


No comments for "Interscience Information Security Principles".

    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top