HOME > 상세정보

상세정보

Fundamentals of computer security

Fundamentals of computer security (1회 대출)

자료유형
단행본
개인저자
Pieprzyk, Josef, 1949-
서명 / 저자사항
Fundamentals of computer security / Josef Pieprzyk.
발행사항
New York :   Springer,   2002.  
형태사항
xx, 677 p. ; 25 cm.
총서사항
Monographs in theoretical computer science
ISBN
3540431012 (alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security. Cryptography.
000 00809camuu2200265 a 4500
001 000000884296
005 20040615164226
008 020530s2002 nyu b 000 0 eng
010 ▼a 2070774
020 ▼a 3540431012 (alk. paper)
040 ▼a DLC ▼c DLC ▼d 211009
042 ▼a pcc
049 ▼a OCLC ▼l 111289909
050 0 0 ▼a QA76.9.A25 ▼b P536 2002
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b P614f
100 1 ▼a Pieprzyk, Josef, ▼d 1949-
245 1 0 ▼a Fundamentals of computer security / ▼c Josef Pieprzyk.
260 ▼a New York : ▼b Springer, ▼c 2002.
300 ▼a xx, 677 p. ; ▼c 25 cm.
440 0 ▼a Monographs in theoretical computer science
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security.
650 0 ▼a Cryptography.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 P614f 등록번호 111289909 (1회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.

New feature

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.


정보제공 : Aladin

목차

1 Introduction.- 2 Background Theory.- 3 Private-Key Cryptosystems.- 4 Public-Key Cryptosystems.- 5 Pseudorandomness.- 6 Hashing.- 7 Digital Signatures.- 8 Authentication.- 9 Secret Sharing.- 10 Group-Oriented Cryptography.- 11 Key Establishment Protocols.- 12 Zero-Knowledge Proof Systems.- 13 Identification.- 14 Intrusion Detection.- 15 Electronic Elections and Digital Money.- 16 Database Protection and Security.- 17 Access Control.- 18 Network Security.- References.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)