
- 289 pages
- English
- PDF
- Available on iOS & Android
About this book
Stay one confident step ahead of the ever-evolving threat potential with today's most powerful IT security tools and techniques found in this practical resource. Written by an international team of security specialists, this one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy, all conveniently organized in self-contained chapters to give you fast access to whatever answers, solutions, or guidance you may need. This total blueprint to security design and operations brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens. It also includes the latest encryption techniques, including algorithms to resist active and side channel attacks. Moreover, you find privacy-enhancing identity management tools, techniques for controlling website content, and even cybercrime investigation techniques that will help you turn the tables on attackers. Case studies of various Internet security applications round out this full collection of security tools that will prove indispensable in your ongoing efforts to safeguard IT systems from attack.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- Contents
- Preface
- CHAPTER 1 Introduction
- CHAPTER 2 Security Concepts, Services, and Threats
- CHAPTER 3 Business-Integrated Information Security Management
- CHAPTER 4 User Authentication Technologies
- CHAPTER 5 Authorization and Access Control
- CHAPTER 6 Data-Centric Applications
- CHAPTER 7 Modern Cryptology
- CHAPTER 8 Network Security
- CHAPTER 9 Standard Public Key and Privilege Management Infrastructures
- CHAPTER 10 Smart Cards and Tokens
- CHAPTER 11 Privacy and Privacy-Enhancing Technologies
- CHAPTER 12 Content Filtering Technologies and the Law
- CHAPTER 13 Model for Cybercrime Investigations
- CHAPTER 14 Systemic-Holistic Approach to ICT Security
- CHAPTER 15 Electronic Voting Systems
- CHAPTER 16 On Mobile Wiki Systems Security
- About the Authors
- Index
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app