The Resource A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes
A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes
Resource Information
The item A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- "Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--
- Language
- eng
- Extent
- 1 online resource
- Contents
-
- Introduction, Stig F. Mjølsnes; Motivation; What Is Information Security?; Some Basic Concepts; A Synopsis of the Topics; Further Reading and Web Sites Security Electronics, E.J. Aas and P.G. Kjeldsberg; Introduction; Examples of Security Electronics; Side Channel Attacks; Summary; Further Reading and Web Sites Public Key Cryptography, S.O. Smalø; Introduction; Hash Functions and One Time Pads; Public Key Cryptography; RSA-Public Key Cryptography; RSA-Public Key Cryptography with Signature; Problem with Signatures; Receipt; Secret Sharing Based on Discrete Logarithm Problems; Further Reading Cryptographic Hash Functions, D
- Gligoroski; Introduction; Definition for Cryptographic Hash Function; Iterated Hash Functions; Most Popular Cryptographic Hash Function; Application of Cryptographic Hash Function; Further Reading and Web Sites Quantum Cryptography, Dag Roar Hjelme, Lars Lydersen, and Vadim Makarov; Introduction; Quantum Bit; Quantum Copying; Quantum Key Distribution; Practical Quantum Cryptography; Technology; Applications; Summary; Further Reading and Web Sites Cryptographic Protocols, Stig F. Mjølsnes; The Origins; Information Policies; Some Concepts; Protocol Failures; Heuristics; Tools for Automated Security Analysis; Further Reading and Web Sites Public Key Distribution, Stig F
- Mjølsnes; The Public Key Distribution Problem; Authenticity and Validity of Public Keys; The Notion of Public Key Certificates; Revocation; Public Key Infrastructure; Identity-Based Public Key; Further Reading and Web Sites Wireless Network Access, Stig F
- Mjølsnes and Martin Eian; Introduction; Wireless Local Area Networks; The 802.11 Security Mechanisms; Wired Equivalent Privacy; RSN with CCMP; Assumptions and Vulnerabilities; Summary; Further Reading and Web Sites Mobile Security, Jan Audestad; The GSM Security; 3G Architecture; Extent of Protection; Security Functions in the Authentication Center; Security Functions in the SGSN/RNC; Security Functions in the Mobile Terminal (USIM); Encryption and Integrity; Anonymity; Example: Anonymous Roaming in a Mobile Network; Using GSM/3G Terminals as Authentication Tokens; Further Reading A Lightweight Approach to Secure Software Engineering, Martin Gilje Jaatun, Jostein Jensen, Per Häkon Meland,
- And Inger Anne Tøndel; Introduction; Asset Identification; Security Requirements; Secure Software Design; Testing for Software Security; Summary; Further Reading and Web Sites ICT Security Evaluation, S.J. Knapskog; Introduction; ISO/IEC 15408, Part 1/3 Evaluation Criteria for IT Security (CC); Definition of Assurance; Building Confidence in the Evaluation Process; Organizing the Requirements in the CC; Assurance Elements; Functional Classes; Protection Profiles (PPs); PP Registries; Definition of a Security Target (ST); Evaluation of a ST; Evaluation Schemes; Evaluation Methodology; Conclusion ICT and Forensic Science, Stig F. Mjølsnes and Svein Y
- Isbn
- 9780429096617
- Label
- A multidisciplinary introduction to information security
- Title
- A multidisciplinary introduction to information security
- Statement of responsibility
- edited by Stig F. Mjolsnes
- Subject
-
- TECHNOLOGY & ENGINEERING -- Electrical
- COMPUTERS -- Computer Engineering
- COMPUTERS -- Networking | General
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computers -- Access control
- Computers -- Access control
- Electronic books
- Multidisciplinary design optimization
- Multidisciplinary design optimization
- Language
- eng
- Summary
- "Preface The problems of information security is a truly multidisciplinary field of study, ranging from the methods of pure mathematics through computer and telecommunication sciences to social sciences. The intention of this multiauthored book is to o er an introduction to a wide set of topics in ICT information security, privacy and safety. Certainly, the aim has not been to present a complete treatment of this vast and expanding area of practical and theoretical knowledge. Rather, the hope is that the selected range of topics presented here may attract a wider audience of students and professionals than would each specialized topic by itself. Some of the information security topics contained in this book may be familiar turf for the reader already. However, the reader will likely also nd some new interesting topics presented here that are relevant to his or her professional needs, or for enhancement of knowledge and competence, or as an attractive starting point for further reading and in-depth studies. For instance, the book may provide an entrance and a guide to seek out more specialized courses available at universities and elsewhere, or as an inspiration for further work in projects and assignments. The start of this collection of information security topics goes back to a master level continuing education course that I organized in 2005, where more than 10 professors and researchers contributed from 6 di erent departments at the Norwegian University of Science and Technology. The topics included cryptography, hardware security, software security, communication and network security, intrusion detection systems, access policy and control, risk and vulnerability analysis, and security technology management"--
- Assigning source
- Provided by publisher
- Cataloging source
- NLE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- no index present
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorName
- Mjølsnes, Stig F.
- Series statement
- Discrete mathematics and its applications
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Computers
- Multidisciplinary design optimization
- COMPUTERS
- COMPUTERS
- TECHNOLOGY & ENGINEERING
- Computer networks
- Computer security
- Computers
- Multidisciplinary design optimization
- Target audience
- adult
- Label
- A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Introduction, Stig F. Mjølsnes; Motivation; What Is Information Security?; Some Basic Concepts; A Synopsis of the Topics; Further Reading and Web Sites Security Electronics, E.J. Aas and P.G. Kjeldsberg; Introduction; Examples of Security Electronics; Side Channel Attacks; Summary; Further Reading and Web Sites Public Key Cryptography, S.O. Smalø; Introduction; Hash Functions and One Time Pads; Public Key Cryptography; RSA-Public Key Cryptography; RSA-Public Key Cryptography with Signature; Problem with Signatures; Receipt; Secret Sharing Based on Discrete Logarithm Problems; Further Reading Cryptographic Hash Functions, D
- Gligoroski; Introduction; Definition for Cryptographic Hash Function; Iterated Hash Functions; Most Popular Cryptographic Hash Function; Application of Cryptographic Hash Function; Further Reading and Web Sites Quantum Cryptography, Dag Roar Hjelme, Lars Lydersen, and Vadim Makarov; Introduction; Quantum Bit; Quantum Copying; Quantum Key Distribution; Practical Quantum Cryptography; Technology; Applications; Summary; Further Reading and Web Sites Cryptographic Protocols, Stig F. Mjølsnes; The Origins; Information Policies; Some Concepts; Protocol Failures; Heuristics; Tools for Automated Security Analysis; Further Reading and Web Sites Public Key Distribution, Stig F
- Mjølsnes; The Public Key Distribution Problem; Authenticity and Validity of Public Keys; The Notion of Public Key Certificates; Revocation; Public Key Infrastructure; Identity-Based Public Key; Further Reading and Web Sites Wireless Network Access, Stig F
- Mjølsnes and Martin Eian; Introduction; Wireless Local Area Networks; The 802.11 Security Mechanisms; Wired Equivalent Privacy; RSN with CCMP; Assumptions and Vulnerabilities; Summary; Further Reading and Web Sites Mobile Security, Jan Audestad; The GSM Security; 3G Architecture; Extent of Protection; Security Functions in the Authentication Center; Security Functions in the SGSN/RNC; Security Functions in the Mobile Terminal (USIM); Encryption and Integrity; Anonymity; Example: Anonymous Roaming in a Mobile Network; Using GSM/3G Terminals as Authentication Tokens; Further Reading A Lightweight Approach to Secure Software Engineering, Martin Gilje Jaatun, Jostein Jensen, Per Häkon Meland,
- And Inger Anne Tøndel; Introduction; Asset Identification; Security Requirements; Secure Software Design; Testing for Software Security; Summary; Further Reading and Web Sites ICT Security Evaluation, S.J. Knapskog; Introduction; ISO/IEC 15408, Part 1/3 Evaluation Criteria for IT Security (CC); Definition of Assurance; Building Confidence in the Evaluation Process; Organizing the Requirements in the CC; Assurance Elements; Functional Classes; Protection Profiles (PPs); PP Registries; Definition of a Security Target (ST); Evaluation of a ST; Evaluation Schemes; Evaluation Methodology; Conclusion ICT and Forensic Science, Stig F. Mjølsnes and Svein Y
- Control code
- 991528211
- Extent
- 1 online resource
- Form of item
- online
- Isbn
- 9780429096617
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1201/b11467
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- tandf_262447
- Specific material designation
- remote
- System control number
- (OCoLC)991528211
- Label
- A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Introduction, Stig F. Mjølsnes; Motivation; What Is Information Security?; Some Basic Concepts; A Synopsis of the Topics; Further Reading and Web Sites Security Electronics, E.J. Aas and P.G. Kjeldsberg; Introduction; Examples of Security Electronics; Side Channel Attacks; Summary; Further Reading and Web Sites Public Key Cryptography, S.O. Smalø; Introduction; Hash Functions and One Time Pads; Public Key Cryptography; RSA-Public Key Cryptography; RSA-Public Key Cryptography with Signature; Problem with Signatures; Receipt; Secret Sharing Based on Discrete Logarithm Problems; Further Reading Cryptographic Hash Functions, D
- Gligoroski; Introduction; Definition for Cryptographic Hash Function; Iterated Hash Functions; Most Popular Cryptographic Hash Function; Application of Cryptographic Hash Function; Further Reading and Web Sites Quantum Cryptography, Dag Roar Hjelme, Lars Lydersen, and Vadim Makarov; Introduction; Quantum Bit; Quantum Copying; Quantum Key Distribution; Practical Quantum Cryptography; Technology; Applications; Summary; Further Reading and Web Sites Cryptographic Protocols, Stig F. Mjølsnes; The Origins; Information Policies; Some Concepts; Protocol Failures; Heuristics; Tools for Automated Security Analysis; Further Reading and Web Sites Public Key Distribution, Stig F
- Mjølsnes; The Public Key Distribution Problem; Authenticity and Validity of Public Keys; The Notion of Public Key Certificates; Revocation; Public Key Infrastructure; Identity-Based Public Key; Further Reading and Web Sites Wireless Network Access, Stig F
- Mjølsnes and Martin Eian; Introduction; Wireless Local Area Networks; The 802.11 Security Mechanisms; Wired Equivalent Privacy; RSN with CCMP; Assumptions and Vulnerabilities; Summary; Further Reading and Web Sites Mobile Security, Jan Audestad; The GSM Security; 3G Architecture; Extent of Protection; Security Functions in the Authentication Center; Security Functions in the SGSN/RNC; Security Functions in the Mobile Terminal (USIM); Encryption and Integrity; Anonymity; Example: Anonymous Roaming in a Mobile Network; Using GSM/3G Terminals as Authentication Tokens; Further Reading A Lightweight Approach to Secure Software Engineering, Martin Gilje Jaatun, Jostein Jensen, Per Häkon Meland,
- And Inger Anne Tøndel; Introduction; Asset Identification; Security Requirements; Secure Software Design; Testing for Software Security; Summary; Further Reading and Web Sites ICT Security Evaluation, S.J. Knapskog; Introduction; ISO/IEC 15408, Part 1/3 Evaluation Criteria for IT Security (CC); Definition of Assurance; Building Confidence in the Evaluation Process; Organizing the Requirements in the CC; Assurance Elements; Functional Classes; Protection Profiles (PPs); PP Registries; Definition of a Security Target (ST); Evaluation of a ST; Evaluation Schemes; Evaluation Methodology; Conclusion ICT and Forensic Science, Stig F. Mjølsnes and Svein Y
- Control code
- 991528211
- Extent
- 1 online resource
- Form of item
- online
- Isbn
- 9780429096617
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1201/b11467
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- tandf_262447
- Specific material designation
- remote
- System control number
- (OCoLC)991528211
Subject
- TECHNOLOGY & ENGINEERING -- Electrical
- COMPUTERS -- Computer Engineering
- COMPUTERS -- Networking | General
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computers -- Access control
- Computers -- Access control
- Electronic books
- Multidisciplinary design optimization
- Multidisciplinary design optimization
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/A-multidisciplinary-introduction-to-information/-KvqzvwzUtg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/A-multidisciplinary-introduction-to-information/-KvqzvwzUtg/">A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/A-multidisciplinary-introduction-to-information/-KvqzvwzUtg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/A-multidisciplinary-introduction-to-information/-KvqzvwzUtg/">A multidisciplinary introduction to information security, edited by Stig F. Mjolsnes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>