Theory and Practice of Cryptography Solutions for Secure Information Systems

Theory and Practice of Cryptography Solutions for Secure Information Systems

Author: Elçi, Atilla

Publisher: IGI Global

Published: 2013-05-31

Total Pages: 611

ISBN-13: 1466640316

DOWNLOAD EBOOK

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.


Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

Author: Ruiz-Martinez, Antonio

Publisher: IGI Global

Published: 2013-09-30

Total Pages: 427

ISBN-13: 1466645156

DOWNLOAD EBOOK

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.


Advances in Secure Computing, Internet Services, and Applications

Advances in Secure Computing, Internet Services, and Applications

Author: Tripathy, B.K.

Publisher: IGI Global

Published: 2013-12-31

Total Pages: 405

ISBN-13: 1466649410

DOWNLOAD EBOOK

Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems. Advances in Secure Computing, Internet Services, and Applications presents current research on the applications of computational intelligence in order to focus on the challenge humans face when securing knowledge and data. This book is a vital reference source for researchers, lecturers, professors, students, and developers, who have interest in secure computing and recent advanced in real life applications.


Security Solutions for Hyperconnectivity and the Internet of Things

Security Solutions for Hyperconnectivity and the Internet of Things

Author: Dawson, Maurice

Publisher: IGI Global

Published: 2016-08-30

Total Pages: 368

ISBN-13: 1522507426

DOWNLOAD EBOOK

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.


Cryptography and Network Security

Cryptography and Network Security

Author: William Stallings

Publisher: Pearson

Published: 2016-02-18

Total Pages: 772

ISBN-13: 0134484525

DOWNLOAD EBOOK

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience.


Information Security

Information Security

Author: Hein Venter

Publisher: Springer

Published: 2019-01-24

Total Pages: 209

ISBN-13: 3030114074

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.


Computer and Cyber Security

Computer and Cyber Security

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2018-11-19

Total Pages: 695

ISBN-13: 0429756313

DOWNLOAD EBOOK

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.


Network and System Security

Network and System Security

Author: Javier Lopez

Publisher: Springer

Published: 2013-05-27

Total Pages: 810

ISBN-13: 3642386318

DOWNLOAD EBOOK

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013, held in Madrid, Spain, in June 2013. The 41 full papers presented were carefully reviewed and selected from 176 submissions. The volume also includes 7 short papers and 13 industrial track papers. The paper are organized in topical sections on network security (including: modeling and evaluation; security protocols and practice; network attacks and defense) and system security (including: malware and intrusions; applications security; security algorithms and systems; cryptographic algorithms; privacy; key agreement and distribution).


Modern Trends Surrounding Information Technology Standards and Standardization within Organizations

Modern Trends Surrounding Information Technology Standards and Standardization within Organizations

Author: Jakobs, Kai

Publisher: IGI Global

Published: 2014-07-31

Total Pages: 361

ISBN-13: 1466663332

DOWNLOAD EBOOK

In fields as diverse as research and development, governance, and international trade, success depends on effective communication. However, limited research exists on how professionals can express themselves consistently across disciplines. Modern Trends Surrounding Information Technology Standards and Standardization within Organizations showcases the far-ranging economic and societal ramifications incited by technical standardization between individuals, organizations, disciplines, and nations. This publication serves as a valuable model for inter-disciplinary scholars, IT researchers, and professionals interested in the link between technology and social change in an increasingly networked and interconnected global society.


Stabilization, Safety, and Security of Distributed Systems

Stabilization, Safety, and Security of Distributed Systems

Author: Stéphane Devismes

Publisher: Springer Nature

Published: 2022-11-08

Total Pages: 378

ISBN-13: 3031210174

DOWNLOAD EBOOK

This book constitutes the proceedings of 24th International Symposium, SSS 2022, which took place in Clermont-Ferrand, France, in November 2022. The 17 regular papers together with 4 invited papers and 7 brief announcements, included in this volume were carefully reviewed and selected from 58 submissions. The SSS 2022 focus on systems built such that they are able to provide on their own guarantees on their structure, performance, and/or security in the face of an adverse environment. The Symposium presents three tracks reflecting major trends related to the conference: (i) Self-stabilizing Systems: Theory and Practice, (ii) Concurrent and Distributed Computing: Foundations, Faulttolerance, and Security, and (iii) Dynamic, Mobile, and Nature-Inspired Computing.