Handbook of Information and Communication Security

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the syste...

Full description

Bibliographic Details
Other Authors: Stavroulakis, Peter (Editor), Stamp, Mark (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2010, 2010
Edition:1st ed. 2010
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Fundamentals and Cryptography
  • A Framework for System Security
  • Public-Key Cryptography
  • Elliptic Curve Cryptography
  • Cryptographic Hash Functions
  • Block Cipher Cryptanalysis
  • Chaos-Based Information Security
  • Bio-Cryptography
  • Quantum Cryptography
  • Intrusion Detection and Access Control
  • Intrusion Detection and Prevention Systems
  • Intrusion Detection Systems
  • Intranet Security via Firewalls
  • Distributed Port Scan Detection
  • Host-Based Anomaly Intrusion Detection
  • Security in Relational Databases
  • Anti-bot Strategies Based on Human Interactive Proofs
  • Access and Usage Control in Grid Systems
  • ECG-Based Authentication
  • Networking
  • Peer-to-Peer Botnets
  • Security of Service Networks
  • Network Traffic Analysis and SCADA Security
  • Mobile Ad Hoc Network Routing
  • Security for Ad Hoc Networks
  • Phishing Attacks and Countermeasures
  • Optical Networking
  • Chaos-Based Secure Optical Communications Using Semiconductor Lasers
  • Chaos Applications in Optical Communications
  • Wireless Networking
  • Security in Wireless Sensor Networks
  • Secure Routing in Wireless Sensor Networks
  • Security via Surveillance and Monitoring
  • Security and Quality of Service in Wireless Networks
  • Software
  • Low-Level Software Security by Example
  • Software Reverse Engineering
  • Trusted Computing
  • Security via Trusted Communications
  • Viruses and Malware
  • Designing a Secure Programming Language
  • Forensics and Legal Issues
  • Fundamentals of Digital Forensic Evidence
  • Multimedia Forensics for Detecting Forgeries
  • Technological and Legal Aspects of CIS.