|
Showing 1 - 4 of
4 matches in All Departments
This reference work looks at modern concepts of computer security.
It introduces the basic mathematical background necessary to follow
computer security concepts before moving on to modern developments
in cryptography. The concepts are presented clearly and illustrated
by numerous examples. Subjects covered include: private-key and
public-key encryption, hashing, digital signatures, authentication,
secret sharing, group-oriented cryptography, and many others. The
section on intrusion detection and access control provide examples
of security systems implemented as a part of operating system.
Database and network security is also discussed. The final chapters
introduce modern e- business systems based on digital cash.
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
With the popularity of the Wireless Local Area Network (WLAN)
standard 802.11 WiFi and the growing interest in the next
generation Wireless Metropolitan Area Network (WMAN) standard
802.16 WiMax, the need for effective solutions to the inherent
security weaknesses of these networking technologies has become of
critical importance. Thoroughly explaining the risks associated
with deploying WLAN and WMAN networks, this groundbreaking book
offers professionals practical insight into identifying and
overcoming these security issues. Including detailed descriptions
of possible solutions to a number of specific security problems,
the book gives practitioners the hands-on techniques that they need
to secure wireless networks in the enterprise and the home.
How to create an Internet of Trusted Data in which insights from
data can be extracted without collecting, holding, or revealing the
underlying data. Trusted Data describes a data architecture that
places humans and their societal values at the center of the
discussion. By involving people from all parts of the ecosystem of
information, this new approach allows us to realize the benefits of
data-driven algorithmic decision making while minimizing the risks
and unintended consequences. It proposes a software architecture
and legal framework for an Internet of Trusted Data that provides
safe, secure access for everyone and protects against bias,
unfairness, and other unintended effects. This approach addresses
issues of data privacy, security, ownership, and trust by allowing
insights to be extracted from data held by different people,
companies, or governments without collecting, holding, or revealing
the underlying data. The software architecture, called Open
Algorithms, or OPAL, sends algorithms to databases rather than
copying or sharing data. The data is protected by existing
firewalls; only encrypted results are shared. Data never leaves its
repository. A higher security architecture, ENIGMA, built on OPAL,
is fully encrypted. Contributors Michiel Bakker, Yves-Alexandre de
Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron
Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro
Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier,
Jacopo Staiano, Guy Zyskind An MIT Connection Science and
Engineering Book
|
|