FEEDBACK Smiley face
Normal view MARC view ISBD view

A multidisciplinary introduction to information security

By: Mjolsnes, Stig F.
Material type: materialTypeLabelBookSeries: Discrete mathematics and its applications.Publisher: Boca Raton : CRC Press, c2012Description: xxv, 322 p. : ill. ; 25 cm.ISBN: 9781420085907.Subject(s): Computer security | Computer networks -- Security measures | Computers -- Access control | Multidisciplinary design optimization | COMPUTERS / Computer Engineering | COMPUTERS / Networking / General | TECHNOLOGY & ENGINEERING / ElectricalSummary: "Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
Books Books IIITD
Reference
Computer Science and Engineering REF 005.8 MJO-M (Browse shelf) Available 001431
Total holds: 0
Browsing IIITD Shelves , Shelving location: Reference , Collection code: Computer Science and Engineering Close shelf browser
REF 005.8 MAL-H Handbook of fingerprint recognition REF 005.8 MAN-P Power analysis attacks : REF 005.8 MES-L Learning kali linux : REF 005.8 MJO-M A multidisciplinary introduction to information security REF 005.8 NEM-P Pervasive information security and privacy developments : REF 005.8 OPP-S Secure messaging on the internet REF 005.8 PIE-F Fundamentals of computer security

Includes bibliographical references and index.

"Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in