Copyright: 2008
Pages: 289
ISBN: 9781596932296

Our Price: $82.00
Qty:

Description
Stay one confident step ahead of the ever-evolving threat potential with today's most powerful IT security tools and techniques found in this practical resource. Written by an international team of security specialists, this one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy, all conveniently organized in self-contained chapters to give you fast access to whatever answers, solutions, or guidance you may need. This total blueprint to security design and operations brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens. It also includes the latest encryption techniques, including algorithms to resist active and side channel attacks. Moreover, you find privacy-enhancing identity management tools, techniques for controlling website content, and even cybercrime investigation techniques that will help you turn the tables on attackers. Case studies of various Internet security applications round out this full collection of security tools that will prove indispensable in your ongoing efforts to safeguard IT systems from attack.
Table Of Contents
Introduction. Security Concepts, Services and Threats. Business-Integrated Information Security Management. User Authentication Technologies. Authorization and Access Control. Data Centric Applications. Modern Cryptology. Network Security. Standard Public Key and Privilege Management Infrastructures. Smart Cards and Tokens. Privacy and Privacy-Enhancing Technologies (PETs). Content Filtering Technologies and the Law. Model for Cybercrime Investigation. Systemic Holistic Approach to IT Security. Electronic Voting Systems. On Mobile Wiki Systems Security. Author 's Biographies

Author

  • Stephen Furnell Steven Furnell is head of the Network Research Group at the University of Plymouth, United Kingdom, and an adjunct associate professor at Edith Cowan University, Australia. He has written over 160 published papers and two popular books in the field. Dr. Furnell is associate editor for Information Management & Computer Security and the Journal of Information Systems Security, an editorial board member of Internet Research, and an international referee for Computers & Security. He is a frequent speaker at international events and workshops addressing topics in computer and systems security.
  • Sokratis Katsikas Sokratis Katsikas is the rector at the University of the Aegean, Greece, where he is also a professor in the Department of Information & Communication Systems Engineering and founder and former director of the Laboratory for the Security of Information and Communication Systems. Dr. Katsikas has participated in more than 60 European and national R&D projects involving information and communication systems security, and has authored or co-authored over 150 journal articles, book chapters, and conference papers. He is the author/editor of 11 books in the field, and has served on the technical committees of numerous international conferences. He received his Ph.D. in computer engineering & informatics from the University of Patras.
  • Javier Lopez Javier Lopez is an associate professor in the Computer Science Department and coordinator of the Information Security Research Group at the University of Malaga, Spain. He is co-editor-in-chief of the International Journal of Information Security and member of the editorial boards of Information Management and Computer Security Journal and the International Journal of Internet Technology and Secured Transactions. Dr. Lopez has led a number of international research projects in the field of information security, and has been appointed as an independent expert by the European Network and Information Security Agency (ENISA). He earned his Ph.D. in computer science at the University of Malaga.
  • Ahmed Patel Ahmed Patel is a consultant and lecturer in computer networks, distributed systems and computer forensics. He has co-authored two books on computer network security and published over 160 technical and scientific papers, and is an editorial board member for the journals Computer Communications, Computer Standards & Interface, and Digital Investigations. Dr. Patel received his Ph.D. in computer science from Trinity College, Dublin.