Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions.
|Published (Last):||26 July 2010|
|PDF File Size:||14.30 Mb|
|ePub File Size:||8.99 Mb|
|Price:||Free* [*Free Regsitration Required]|
It has 18 chapters, each It may be used for self-study, as well as a text for undergraduate and postgraduate courses. Please sign in to write a review. If you have changed your email address then contact us and we will update your details.
The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others.
The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system.
Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash. From the reviews: "The goal of the book is to present the basic concepts in computer and network security. Added to basket.
Ghost in the Wires. Kevin D. Crime Dot Com. Geoff White. Democracy Hacked. Martin Moore. Cybersecurity and Cyberwar. Peter W. Hello World. Hannah Fry. Kingdom of Lies. Kate Fazzini. Social Engineering.
Christopher Hadnagy. Profile Books. Mike Chapple. Whaling for beginners. Jerome Vincent. Coding Democracy. Maureen Webb. The Art of Deception. Nuking the Moon. Vince Houghton. Jon Erickson. Your review has been submitted successfully. Not registered? Forgotten password Please enter your email address below and we'll send you a link to reset your password. Not you? Reset password. Download Now Dismiss. Simply reserve online and pay at the counter when you collect.
Available in shop from just two hours, subject to availability. Your order is now being processed and we have sent a confirmation email to you at. This item can be requested from the shops shown below. If this item isn't available to be reserved nearby, add the item to your basket instead and select 'Deliver to my local shop' at the checkout, to be able to collect it from there at a later date. Preferred contact method Email Text message. When will my order be ready to collect?
Following the initial email, you will be contacted by the shop to confirm that your item is available for collection. Call us on or send us an email at. Unfortunately there has been a problem with your order.
Please try again or alternatively you can contact your chosen shop on or send us an email at.
Fundamentals of Computer Security
Fundamentals Of Computer Security
If you want to know all basics of cryptographic systems and are planning on getting into the field of computer security, either working as a white hat or a general computer security enthusiast, this Thomas Hardjono received his B. Hardjono is a principal scientist in the strategic technologies group at VeriSign, Inc. Fundamentals of Computer Security. This reference work looks at modern concepts of computer security.