Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link: https://ebookbell.com/faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookBell Team
4.4
12 reviewsInformation security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge.
Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes:
This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive set of classroom-tested PowerPoint slides and a solutions manual are available to assist in course development.
Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
A solutions manual is available. Please email [email protected] to obtain it.Content:
Chapter 1 Introduction (pages 1–16):
Chapter 2 Crypto Basics (pages 17–49):
Chapter 3 Symmetric Key Crypto (pages 51–87):
Chapter 4 Public Key Crypto (pages 89–123):
Chapter 5 Hash Functions++ (pages 125–165):
Chapter 6 Advanced Cryptanalysis (pages 167–225):
Chapter 7 Authentication (pages 227–264):
Chapter 8 Authorization (pages 265–310):
Chapter 9 Simple Authentication Protocols (pages 311–349):
Chapter 10 Real?World Security Protocols (pages 351–400):
Chapter 11 Software Flaws and Malware (pages 401–446):
Chapter 12 Insecurity in Software (pages 447–489):
Chapter 13 Operating Systems and Security (pages 491–510):