Amazon cover image
Image from Amazon.com

Information security : principles and practice, an indian adaptation

By: Material type: TextTextPublication details: Wiley , New delhi : ©2023Edition: 3rd edDescription: xxii, 530 p. : ill. ; 24 cmISBN:
  • 9789354644313
Subject(s): DDC classification:
  • 005.8 STA-I
Contents:
1 Introductions 2 Classic Cryptography 3 Symmetric Ciphers 4 Public Key Crypto 5 Crypto Hash Functions++ 6 Authentication 7 Authorization 8 Network Security Basics 9 Simple Authentication Protocols 10 Real-World Security Protocols 11 Software Flaws and Malware 12 Insecurity in Software
Summary: "As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--BOOK JACKET. Collapse summary
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Books Books IIITD General Stacks Computer Science and Engineering 005.8 STA-I (Browse shelf(Opens below)) Available 012911
Total holds: 0

Includes bibliographical references and index.

1 Introductions 2 Classic Cryptography 3 Symmetric Ciphers 4 Public Key Crypto 5 Crypto Hash Functions++ 6 Authentication 7 Authorization 8 Network Security Basics 9 Simple Authentication Protocols 10 Real-World Security Protocols 11 Software Flaws and Malware 12 Insecurity in Software

"As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges." "Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues."--BOOK JACKET.
Collapse summary

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in