Information Security

About The Book

The book contains: The meaning of computer Security Computer Criminals Methods of Defense Elementary Cryptography: Substitution Ciphers Transpositions Making “Good” Encryption algorithms The Data Encryption Standard The AES Encryption Algorithms Public Key Encryptions Uses of Encryption. Program Security: Secure Programs Non-malicious Program Errors viruses and other malicious code Targeted Malicious code controls Against Program Threats Protection in General - Purpose operating system protected objects and methods of protection memory and addmens protection File protection Mechanisms User Authentication Designing Trusted O.S: Security polices models of security trusted O.S design Assurance in trusted O.S. Implementation examples. Data base Security: Security requirements Reliability and integrity Sensitive data Inference multilevel database proposals for multilevel security. Security in Network: Threats in Network Network Security Controls Firewalls Intrusion Detection Systems Secure E-Mail.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE