Information Security : Principles and Practice /

Stamp, Mark

Information Security : Principles and Practice / Mark Stamp and content contribution for Indian adaptation by Ashutosh Saxena - 3rd Ed. - New Delhi Wiley India Pvt. Ltd. 2023 - xxii, 530p. : ill. 24cm

It includes Index Pages,



Preface to the Adapted Edition

Preface to the US Edition

About the Author

Acknowledgments

1 Introduction

1.1 The Cast of Characters

1.2 Alice’s Online Bank

1.3 About This Book

1.4 The People Problem

1.5 Principles and Practice

I Crypto

2 Classic Crypto

2.1 Introduction

2.2 How to Speak Crypto

2.3 Classic Ciphers

2.4 Classic Crypto in History

2.5 Modern Crypto History

2.6 A Taxonomy of Cryptography

2.7 A Taxonomy of Cryptanalysis

3 Symmetric Ciphers

3.1 Introduction

3.2 Stream Ciphers

3.3 Block Ciphers

3.4 Integrity

3.5 Quantum Computers and Symmetric Crypto

4 Public Key Crypto

4.1 Introduction

4.2 Knapsack

4.3 RSA

4.4 Diffie–Hellman

4.5 Elliptic Curve Cryptography

4.6 ElGamal

4.7 Rabin Cryptosystem

4.8 Public Key Notation

4.9 Uses for Public Key Crypto

4.10 Certificates and PKI

4.11 Quantum Computers and Public Key

5 Crypto Hash Functions++

5.1 Introduction

5.2 What Is a Cryptographic Hash Function?

5.3 The Birthday Problem

5.4 A Birthday Attack

5.5 Non-Cryptographic Hashes

5.6 SHA-3

5.7 HMAC

5.8 Additional Cryptographic Hash Functions

5.9 Cryptographic Hash Applications

5.10 Miscellaneous Crypto-Related Topics

II Access Control

6 Authentication

6.1 Introduction

6.2 Authentication Methods

6.3 Passwords

6.4 Biometrics

6.5 Something You Have

6.6 Multi-Factor Authentication

6.7 Single Sign-On and Web Cookies

7 Authorization

7.1 Introduction

7.2 A Brief History of Authorization

7.3 Access Control Matrix

7.4 Multilevel Security Models

7.5 Covert Channels

7.6 Inference Control

7.7 CAPTCHA

III Topics in Network Security

8 Network Security Basics

8.1 Introduction

8.2 Networking Basics

8.3 Cross-Site Scripting Attacks

8.4 Firewalls

8.5 Intrusion Detection Systems

9 Simple Authentication Protocols

9.1 Introduction

9.2 Simple Security Protocols

9.3 Authentication Protocols

9.4 “Authentication” and TCP

9.5 Zero Knowledge Proofs

9.6 Tips for Analyzing Protocols

10 Real-World Security Protocols

10.1 Introduction

10.2 SSH

10.3 SSL

10.4 IPsec

10.5 Kerberos

10.6 WEP

10.7 GSM

IV Software

11 Software Flaws and Malware

11.1 Introduction

11.2 Software Flaws

11.3 Malware

11.4 Miscellaneous Software-Based Attacks

12 Insecurity in Software

12.1 Introduction

12.2 Software Reverse Engineering

12.3 Software Development

12.4 Reproducible Builds

12.5 Secure Coding Practices

Summary

Problems

Computer Problem

Multiple Choice Questions

Appendix

A-1 Modular Arithmetic

A-2 Permutations

A-3 Probability

A-4 DES Permutations

A-5 Substitution–Permutation Networks

A-6 Cyber Laws and Forensics

A-7 Digital Rights Management

Bibliography

Index


9789354644313


Information Security

005.8 STA

Visitor Number:

Powered by Koha