Fundamentals of Computer Security / by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry.
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, a...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Main Author: | |
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2003.
|
Subjects: |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | b8001552 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 130217s2003 gw o 000 0 eng | ||
005 | 20240418145502.6 | ||
020 | |a 9783662073247 |q (electronic bk.) | ||
020 | |a 3662073242 |q (electronic bk.) | ||
020 | |z 9783642077135 | ||
020 | |z 3642077137 | ||
020 | |z 3662073242 | ||
024 | 7 | |a 10.1007/978-3-662-07324-7 | |
035 | |a (OCoLC)spr851377933 | ||
035 | |a (OCoLC)851377933 | ||
037 | |a spr10.1007/978-3-662-07324-7 | ||
040 | |a AU@ |b eng |e pn |c AU@ |d GW5XE |d COO |d OCLCQ |d EBLCP |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 | |
100 | 1 | |a Pieprzyk, Josef. | |
245 | 1 | 0 | |a Fundamentals of Computer Security / |c by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry. |
260 | |a Berlin, Heidelberg : |b Springer Berlin Heidelberg, |c 2003. | ||
300 | |a 1 online resource (xx, 677 pages) | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
505 | 0 | |a Introduction -- Background Theory -- Private-Key Cryptosystems -- Public-Key Cryptosystems -- Pseudorandomness -- Hashing -- Digital Signatures -- Authentication -- Secret Sharing -- Group-Oriented Cryptography -- Key Establishment Protocols -- Zero-Knowledge Proof Systems -- Identification -- Intrusion Detection -- Electronic Elections and Digital Money -- Database Protection and Security -- Access Control -- Network Security -- References -- Index. | |
520 | |a This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-business systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material. | ||
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer networks. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Data structures (Computer science) | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Coding theory. | |
700 | 1 | |a Hardjono, Thomas. | |
700 | 1 | |a Seberry, Jennifer. | |
776 | 0 | 8 | |i Print version: |z 9783642077135. |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-07324-7 |z Full Text (via Springer) |
907 | |a .b80015529 |b 07-02-19 |c 06-01-15 | ||
998 | |a web |b 05-01-17 |c f |d b |e - |f eng |g gw |h 0 |i 1 | ||
915 | |a M | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Book Archive - Springer Computer Science | ||
956 | |a Computer Science | ||
956 | |a Springer e-books: Archive | ||
999 | f | f | |i 64732e51-9e94-506a-bee2-11b52438e581 |s 00f82277-87fc-5809-a3c8-89b0ac4ef4e5 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 |h Library of Congress classification |i Ebooks, Prospector |n 1 |