A multidisciplinary introduction to information security (Record no. 11158)

MARC details
000 -LEADER
fixed length control field 02384 a2200193 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250829153442.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781420085907
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number MJM
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Mjolsnes, Stig F.
9 (RLIN) 15006
245 12 - TITLE STATEMENT
Title A multidisciplinary introduction to information security
Statement of responsibility, etc. Stig F. Mjolsnes
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton:
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. 2012.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 322p.
500 ## - GENERAL NOTE
General note HB
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Include index
520 ## - SUMMARY, ETC.
Summary, etc. With most services and products now being offered through digital communications, new challenges have emerged for information security specialists. A Multidisciplinary Introduction to Information Security presents a range of topics on the security, privacy, and safety of information and communication technology. It brings together methods in pure mathematics, computer and telecommunication sciences, and social sciences. The book begins with the cryptographic algorithms of the Advanced Encryption Standard (AES) and Rivest, Shamir, and Adleman (RSA). It explains the mathematical reasoning behind public key cryptography and the properties of a cryptographic hash function before presenting the principles and examples of quantum cryptography. The text also describes the use of cryptographic primitives in the communication process, explains how a public key infrastructure can mitigate the problem of crypto-key distribution, and discusses the security problems of wireless network access. After examining past and present protection mechanisms in the global mobile telecommunication system, the book proposes a software engineering practice that prevents attacks and misuse of software. It then presents an evaluation method for ensuring security requirements of products and systems, covers methods and tools of digital forensics and computational forensics, and describes risk assessment as part of the larger activity of risk management. The final chapter focuses on information security from an organizational and people point of view. As our ways of communicating and doing business continue to shift, information security professionals must find answers to evolving issues. Offering a starting point for more advanced work in the field, this volume addresses various security and privacy problems and solutions related to the latest information and communication technology.
546 ## - LANGUAGE NOTE
Language note Eng
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
9 (RLIN) 215800
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Central Library Allama Iqbal Open University Islamabad Central Library Allama Iqbal Open University Islamabad General Stacks 08/05/2012   005.8 MJM 115625 17/03/2015 17/03/2015 Books

Copyright © 2025, All rights reserved,
Central Library, AIOU, Islamabad Pakistan.