000 04007nam a22002297a 4500
005 20250315102610.0
008 250224b |||||||| |||| 00| 0 eng d
020 _a9789354644313
040 _cVITAP
082 _223rd Ed.
_a005.8 STA
100 _aStamp, Mark
_914615
245 _aInformation Security :
_bPrinciples and Practice /
_cMark Stamp and content contribution for Indian adaptation by Ashutosh Saxena
250 _a3rd Ed.
260 _aNew Delhi
_bWiley India Pvt. Ltd.
_c2023
300 _axxii, 530p. : ill. 24cm
500 _aIt includes Index Pages,
505 _a Preface to the Adapted Edition Preface to the US Edition About the Author Acknowledgments 1 Introduction 1.1 The Cast of Characters 1.2 Alice’s Online Bank 1.3 About This Book 1.4 The People Problem 1.5 Principles and Practice I Crypto 2 Classic Crypto 2.1 Introduction 2.2 How to Speak Crypto 2.3 Classic Ciphers 2.4 Classic Crypto in History 2.5 Modern Crypto History 2.6 A Taxonomy of Cryptography 2.7 A Taxonomy of Cryptanalysis 3 Symmetric Ciphers 3.1 Introduction 3.2 Stream Ciphers 3.3 Block Ciphers 3.4 Integrity 3.5 Quantum Computers and Symmetric Crypto 4 Public Key Crypto 4.1 Introduction 4.2 Knapsack 4.3 RSA 4.4 Diffie–Hellman 4.5 Elliptic Curve Cryptography 4.6 ElGamal 4.7 Rabin Cryptosystem 4.8 Public Key Notation 4.9 Uses for Public Key Crypto 4.10 Certificates and PKI 4.11 Quantum Computers and Public Key 5 Crypto Hash Functions++ 5.1 Introduction 5.2 What Is a Cryptographic Hash Function? 5.3 The Birthday Problem 5.4 A Birthday Attack 5.5 Non-Cryptographic Hashes 5.6 SHA-3 5.7 HMAC 5.8 Additional Cryptographic Hash Functions 5.9 Cryptographic Hash Applications 5.10 Miscellaneous Crypto-Related Topics II Access Control 6 Authentication 6.1 Introduction 6.2 Authentication Methods 6.3 Passwords 6.4 Biometrics 6.5 Something You Have 6.6 Multi-Factor Authentication 6.7 Single Sign-On and Web Cookies 7 Authorization 7.1 Introduction 7.2 A Brief History of Authorization 7.3 Access Control Matrix 7.4 Multilevel Security Models 7.5 Covert Channels 7.6 Inference Control 7.7 CAPTCHA III Topics in Network Security 8 Network Security Basics 8.1 Introduction 8.2 Networking Basics 8.3 Cross-Site Scripting Attacks 8.4 Firewalls 8.5 Intrusion Detection Systems 9 Simple Authentication Protocols 9.1 Introduction 9.2 Simple Security Protocols 9.3 Authentication Protocols 9.4 “Authentication” and TCP 9.5 Zero Knowledge Proofs 9.6 Tips for Analyzing Protocols 10 Real-World Security Protocols 10.1 Introduction 10.2 SSH 10.3 SSL 10.4 IPsec 10.5 Kerberos 10.6 WEP 10.7 GSM IV Software 11 Software Flaws and Malware 11.1 Introduction 11.2 Software Flaws 11.3 Malware 11.4 Miscellaneous Software-Based Attacks 12 Insecurity in Software 12.1 Introduction 12.2 Software Reverse Engineering 12.3 Software Development 12.4 Reproducible Builds 12.5 Secure Coding Practices Summary Problems Computer Problem Multiple Choice Questions Appendix A-1 Modular Arithmetic A-2 Permutations A-3 Probability A-4 DES Permutations A-5 Substitution–Permutation Networks A-6 Cyber Laws and Forensics A-7 Digital Rights Management Bibliography Index
650 0 _aInformation Security
_914616
700 _aSaxena, Ashutosh.
_eContent Contributor for Indian Adaptation
_915248
856 _uhttps://www.wileyindia.com/information-security-3ed-principles-and-practice-an-indian-adaptation.html
942 _2ddc
_cBK
_e23rd
_h005.8
_mSTA
999 _c46159
_d46159