Team for Research in
Ubiquitous Secure Technology

Information Security: Principles and Practice
Mark Stamp

Citation
Mark Stamp. "Information Security: Principles and Practice". Wiley InterScience, 2006, 978-0-471-73848-0.

Abstract
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

Electronic downloads

Citation formats  
  • HTML
    Mark Stamp. <a
    href="http://www.truststc.org/pubs/239.html"
    ><i>Information Security: Principles and
    Practice</i></a>, Wiley InterScience, 2006,
    978-0-471-73848-0.
  • Plain text
    Mark Stamp. "Information Security: Principles and
    Practice". Wiley InterScience, 2006, 978-0-471-73848-0.
  • BibTeX
    @book{Stamp06_InformationSecurityPrinciplesPractice,
        author = {Mark Stamp},
        title = {Information Security: Principles and Practice},
        publisher = {Wiley InterScience},
        year = {2006},
        isbn = {978-0-471-73848-0},
        abstract = {Your expert guide to information security As
                  businesses and consumers become more dependent on
                  complex multinational information systems, the
                  need to understand and devise sound information
                  security systems has never been greater. This
                  title takes a practical approach to information
                  security by focusing on real-world examples. While
                  not sidestepping the theory, the emphasis is on
                  developing the skills and knowledge that security
                  and information technology students and
                  professionals need to face their challenges. The
                  book is organized around four major themes: *
                  Cryptography: classic cryptosystems, symmetric key
                  cryptography, public key cryptography, hash
                  functions, random numbers, information hiding, and
                  cryptanalysis * Access control: authentication and
                  authorization, password-based security, ACLs and
                  capabilities, multilevel and multilateral
                  security, covert channels and inference control,
                  BLP and Biba's models, firewalls, and intrusion
                  detection systems * Protocols: simple
                  authentication protocols, session keys, perfect
                  forward secrecy, timestamps, SSL, IPSec, Kerberos,
                  and GSM * Software: flaws and malware, buffer
                  overflows, viruses and worms, software reverse
                  engineering, digital rights management, secure
                  software development, and operating systems
                  security Additional features include numerous
                  figures and tables to illustrate and clarify
                  complex topics, as well as problems-ranging from
                  basic to challenging-to help readers apply their
                  newly developed skills. A solutions manual and a
                  set of classroom-tested PowerPoint(r) slides will
                  assist instructors in their course development.
                  Students and professors in information technology,
                  computer science, and engineering, and
                  professionals working in the field will find this
                  reference most useful to solve their information
                  security issues. An Instructor's Manual presenting
                  detailed solutions to all the problems in the book
                  is available from the Wiley editorial department.
                  An Instructor Support FTP site is also available.},
        URL = {http://www.truststc.org/pubs/239.html}
    }
    

Posted by Mark Stamp on 23 Mar 2007.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.