did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781596932289

Securing Information and Communications Systems : Principles, Technologies, and Applications

by ; ; ;
  • ISBN13:

    9781596932289

  • ISBN10:

    1596932287

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2008-04-30
  • Publisher: Artech House
  • Purchase Benefits
List Price: $119.00
  • Digital
    $147.38
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Stay one confident step ahead of the ever-evolving threat potential with today's most powerful IT security tools and techniques found in this practical resource. Written by an international team of security specialists, this one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy, all conveniently organized in self-contained chapters to give you fast access to whatever answers, solutions, or guidance you may need.This total blueprint to security design and operations brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens. It also includes the latest encryption techniques, including algorithms to resist active and side channel attacks. Moreover, you find privacy-enhancing identity management tools, techniques for controlling website content, and even cybercrime investigation techniques that will help you turn the tables on attackers. Case studies of various Internet security applications round out this full collection of security tools that will prove indispensable in your ongoing efforts to safeguard IT systems from attack.

Table of Contents

Introductionp. 1
Security Concepts, Services, and Threatsp. 5
Business-Integrated Information Security Managementp. 21
User Authentication Technologiesp. 35
Authorization and Access Controlp. 61
Data-Centric Applicationsp. 87
Modern Cryptologyp. 105
Network Securityp. 139
Standard Public Key and Privilege Management Infrastructuresp. 171
Smart Cards and Tokensp. 193
Privacy and Privacy-Enhancing Technologiesp. 213
Content Filtering Technologies and the Lawp. 243
Model for Cybercrime Investigationsp. 267
Systemic-Holistic Approach to ICT Securityp. 283
Electronic Voting Systemsp. 307
On Mobile Wiki Systems Securityp. 323
Indexp. 347
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program