Information security principles and practice /
Main Author: | |
---|---|
Corporate Author: | |
Format: | Book |
Language: | English |
Published: |
Hoboken, NJ:
Wiley,
c2006
|
Subjects: | |
Online Access: | http://login.proxy.eap.gr/login?url=http://dx.doi.org/10.1002/0471744190 |
Table of Contents:
- Crypto basics
- Symmetric key crypto
- Public key crypto
- Hash functions and other topics
- Advanced cryptanalysis
- Authentication
- Authorization
- Simple authentication protocols
- Real-world security protocols
- Software flaws and malware
- Insecurity in software