Fundamentals of Computer Security / by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry.

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, a...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Main Author: Pieprzyk, Josef
Other Authors: Hardjono, Thomas, Seberry, Jennifer
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003.
Subjects:

MARC

LEADER 00000cam a2200000Mi 4500
001 b8001552
006 m o d
007 cr |||||||||||
008 130217s2003 gw o 000 0 eng
005 20240418145502.6
020 |a 9783662073247  |q (electronic bk.) 
020 |a 3662073242  |q (electronic bk.) 
020 |z 9783642077135 
020 |z 3642077137 
020 |z 3662073242 
024 7 |a 10.1007/978-3-662-07324-7 
035 |a (OCoLC)spr851377933 
035 |a (OCoLC)851377933 
037 |a spr10.1007/978-3-662-07324-7 
040 |a AU@  |b eng  |e pn  |c AU@  |d GW5XE  |d COO  |d OCLCQ  |d EBLCP  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25 
100 1 |a Pieprzyk, Josef. 
245 1 0 |a Fundamentals of Computer Security /  |c by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry. 
260 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2003. 
300 |a 1 online resource (xx, 677 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
505 0 |a Introduction -- Background Theory -- Private-Key Cryptosystems -- Public-Key Cryptosystems -- Pseudorandomness -- Hashing -- Digital Signatures -- Authentication -- Secret Sharing -- Group-Oriented Cryptography -- Key Establishment Protocols -- Zero-Knowledge Proof Systems -- Identification -- Intrusion Detection -- Electronic Elections and Digital Money -- Database Protection and Security -- Access Control -- Network Security -- References -- Index. 
520 |a This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-business systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material. 
650 0 |a Computer science. 
650 0 |a Computer networks. 
650 0 |a Data protection. 
650 0 |a Data structures (Computer science) 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory. 
700 1 |a Hardjono, Thomas. 
700 1 |a Seberry, Jennifer. 
776 0 8 |i Print version:  |z 9783642077135. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-07324-7  |z Full Text (via Springer) 
907 |a .b80015529  |b 07-02-19  |c 06-01-15 
998 |a web  |b 05-01-17  |c f  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
915 |a M 
956 |a Springer e-books 
956 |b Springer Nature - Springer Book Archive - Springer Computer Science 
956 |a Computer Science 
956 |a Springer e-books: Archive 
999 f f |i 64732e51-9e94-506a-bee2-11b52438e581  |s 00f82277-87fc-5809-a3c8-89b0ac4ef4e5 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i Ebooks, Prospector  |n 1