000 04087nam a22004695i 4500
001 978-3-642-04117-4
003 DE-He213
005 20140220084526.0
007 cr nn 008mamaa
008 100715s2010 gw | s |||| 0|eng d
020 _a9783642041174
_9978-3-642-04117-4
024 7 _a10.1007/978-3-642-04117-4
_2doi
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
082 0 4 _a621.382
_223
100 1 _aStavroulakis, Peter.
_eeditor.
245 1 0 _aHandbook of Information and Communication Security
_h[electronic resource] /
_cedited by Peter Stavroulakis, Mark Stamp.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aFundamentals and Cryptography -- A Framework for System Security -- Public-Key Cryptography -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based Information Security -- Bio-Cryptography -- Quantum Cryptography -- Intrusion Detection and Access Control -- Intrusion Detection and Prevention Systems -- Intrusion Detection Systems -- Intranet Security via Firewalls -- Distributed Port Scan Detection -- Host-Based Anomaly Intrusion Detection -- Security in Relational Databases -- Anti-bot Strategies Based on Human Interactive Proofs -- Access and Usage Control in Grid Systems -- ECG-Based Authentication -- Networking -- Peer-to-Peer Botnets -- Security of Service Networks -- Network Traffic Analysis and SCADA Security -- Mobile Ad Hoc Network Routing -- Security for Ad Hoc Networks -- Phishing Attacks and Countermeasures -- Optical Networking -- Chaos-Based Secure Optical Communications Using Semiconductor Lasers -- Chaos Applications in Optical Communications -- Wireless Networking -- Security in Wireless Sensor Networks -- Secure Routing in Wireless Sensor Networks -- Security via Surveillance and Monitoring -- Security and Quality of Service in Wireless Networks -- Software -- Low-Level Software Security by Example -- Software Reverse Engineering -- Trusted Computing -- Security via Trusted Communications -- Viruses and Malware -- Designing a Secure Programming Language -- Forensics and Legal Issues -- Fundamentals of Digital Forensic Evidence -- Multimedia Forensics for Detecting Forgeries -- Technological and Legal Aspects of CIS.
520 _aThe Handbook of Information and Communication Security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors’ intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. This handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for new material to cover in their security courses. In addition, the topics in this volume are highly relevant to the real world practice of information security, which should make this book a valuable resource for working IT professionals. This handbook will be a valuable resource for a diverse audience for many years to come.
650 0 _aEngineering.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aTelecommunication.
650 1 4 _aEngineering.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aSystems and Data Security.
700 1 _aStamp, Mark.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642041167
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-04117-4
912 _aZDB-2-ENG
999 _c111578
_d111578