Computer Security and the Internet Tools and Jewels
They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security,...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Cham
Springer International Publishing
2020, 2020
|
Edition: | 1st ed. 2020 |
Series: | Information Security and Cryptography
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Basic Concepts and Principles
- Cryptographic Building Blocks
- User Authentication: Passwords, Biometrics and Alternatives
- Authentication Protocols and Key Establishment
- Operating System Security and Access Control
- Software Security: Exploits and Privilege Escalation
- Malicious Software
- Public-Key Certificate Management and Use Cases
- Web and Browser Security
- Firewalls and Tunnels
- Intrusion Detection and Network-Based Attacks
- Epilogue
- Index