9781119505907-1119505909-Information Security: Principles and Practice, 3rd Edition

Information Security: Principles and Practice, 3rd Edition

ISBN-13: 9781119505907
ISBN-10: 1119505909
Edition: 3
Author: Mark Stamp
Publication date: 2021
Publisher: Wiley
Format: Hardcover 448 pages
FREE US shipping
Rent
35 days
from $16.77 USD
FREE shipping on RENTAL RETURNS
Buy

From $48.14

Rent

From $16.77

Book details

ISBN-13: 9781119505907
ISBN-10: 1119505909
Edition: 3
Author: Mark Stamp
Publication date: 2021
Publisher: Wiley
Format: Hardcover 448 pages

Summary

Information Security: Principles and Practice, 3rd Edition (ISBN-13: 9781119505907 and ISBN-10: 1119505909), written by authors Mark Stamp, was published by Wiley in 2021. With an overall rating of 4.4 stars, it's a notable title among other Information Theory (Computer Science, Security & Encryption) books. You can easily purchase or rent Information Security: Principles and Practice, 3rd Edition (Hardcover, Used) from BooksRun, along with many other new and used Information Theory books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $22.48.

Description

INFORMATION SECURITY
Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout
Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data.
Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook:
Provides up-to-date coverage of the rapidly evolving field of information security
Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols
Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments
Discusses software security issues, ranging from malware detection to secure software development
Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resources
Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.
From the Inside Flap
Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout
Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data.
Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook:
Provides up-to-date coverage of the rapid

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book