|
Showing 1 - 7 of
7 matches in All Departments
The text is written to provide readers with a comprehensive study
of information security and management system, audit planning and
preparation, audit techniques and collecting evidence,
international information security (ISO) standard 27001, and asset
management. It further discusses important topics such as security
mechanisms, security standards, audit principles, audit competence
and evaluation methods, and the principles of asset management. It
will serve as an ideal reference text for senior undergraduate,
graduate students, and researchers in fields including electrical
engineering, electronics and communications engineering, computer
engineering, and information technology. The book explores
information security concepts and applications from an
organizational information perspective and explains the process of
audit planning and preparation. It further demonstrates audit
techniques and collecting evidence to write important documentation
by following the ISO 27001 standards. The book: Elaborates on the
application of confidentiality, integrity, and availability (CIA)
in the area of audit planning and preparation Covers topics such as
managing business assets, agreements on how to deal with business
assets, and media handling Demonstrates audit techniques and
collects evidence to write the important documentation by following
the ISO 27001 standards Explains how the organization's assets are
managed by asset management, and access control policies Presents
seven case studies
This textbook offers the knowledge and the mathematical background
or techniques that are required to implement encryption/decryption
algorithms or security techniques. It also provides the
information on the cryptography and a cryptosystem used by
organizations and applications to protect their data and users can
explore classical and modern cryptography. The first two chapters
are dedicated to the basics of cryptography and emphasize on modern
cryptography concepts and algorithms. Â Cryptography
terminologies such as encryption, decryption, cryptology,
cryptanalysis and keys and key types included at the beginning of
this textbook . The subsequent chapters cover basic phenomenon of
symmetric and asymmetric cryptography with examples including the
function of symmetric key encryption of websites and asymmetric key
use cases. This would include security measures for websites,
emails, and other types of encryptions that demand key exchange
over a public network. Cryptography algorithms (Caesar cipher, Hill
cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA,
CAST, etc.) which are varies on algorithmic criteria like-
scalability, flexibility, architecture, security, limitations in
terms of attacks of adversary. They are the core consideration on
which all algorithms differs and applicable as per application
environment. The modern cryptography starts from invent of RSA
(Rivest-Shamir-Adleman) which is an asymmetric key algorithm based
on prime numbers. Nowadays it is enabled with email and digital
transaction over the Internet. This textbook covers Chinese
remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem,
generalized ElGamal public key cryptosystem, key management,
digital signatures, message authentication, differential
cryptanalysis, linear cryptanalysis, time-memory trade-off attack,
network security, cloud security, blockchain, bitcoin, etc. as well
as accepted phenomenon under modern cryptograph. Advanced level
students will find this textbook essential for course work and
independent study. Computer scientists and engineers and
researchers working within these related fields will also find this
textbook useful.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|