Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Aspects of Network and Information Security [ISBN: 9781586038564] for the semester, quarter, and short term or search our site for other textbooks by Kranakis, Evangelos; Haroutunian, Evgueni; Shahbazian, Elisa. Renting a textbook can save you up to 90% from the cost of buying.
Preface | p. v |
Network Security | |
Network security and survivability: using wireless overlay networks for critical infrastructure protection | p. 3 |
Security when routers are taken over by the adversary | p. 10 |
Security in quantum cryptography and quantum networks | p. 19 |
The case for self-healing software | p. 47 |
Multi-agent modeling and the simulation of computer network security processes: "a game of network cats and mice" | p. 56 |
Formal treatment of secure protocols: an introduction | p. 74 |
Behavioral and structural properties of malicious code | p. 92 |
Security from the practitioner's point of view | p. 110 |
Mobile and wireless communications security | p. 119 |
Humanitarian problems in information security | p. 134 |
Multimedia security: open problems and solutions | p. 143 |
A selective introduction to border gateway protocol (BGP) security issues | p. 152 |
Information Security | |
Steganography & steganalysis an overview of research & challenges | p. 179 |
Guessing and cryptography | p. 211 |
The exact and approximate encryption of quantum information | p. 218 |
A new approach to stochastic quantum processes, their manipulation and control | p. 234 |
Reliability approach in Wiretapper guessing theory | p. 248 |
E-capacity of information hiding systems | p. 261 |
Quasicrystals in cryptography | p. 274 |
Asymptotic investigation of mutual information and capacity of certain communication channels | p. 283 |
Information theory of covert timing channels | p. 292 |
Coding | |
A survey of new results in coding with feedback and searching with lies | p. 299 |
Remarks on E-optimal rate function in DMS coding | p. 308 |
Reconstruction of data distorted by some errors | p. 315 |
On (w, r) cover-free codes | p. 324 |
Switching methods for error-correcting codes | p. 333 |
On reconstruction of functions on the hypercube | p. 343 |
Index | p. 351 |
Author index | p. 355 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.