Handbook of information and communication security: Part 1
➤ Gửi thông báo lỗi ⚠️ Báo cáo tài liệu vi phạmNội dung chi tiết: Handbook of information and communication security: Part 1
Handbook of information and communication security: Part 1
Peter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1Information and Communication SecuritySpringerhttps://khothuvien.cori!EditorsProf. Peter Stavroulakis Technical University of Crete 73132 Chania. CreteGreecepete_tsi@yahoo.grProf. Mark Stamp Dept. Computer Science San Jose State University One Washington Square San Jose. CA 95192 USAstamp@cs.sjsu.ed Handbook of information and communication security: Part 1uISBN 978 3 612 0'1116 7e ISBN 978 3 6'12 01117 1DOI 10.1007/978 1 8'1882 68'1 7Springer Heidelberg Dordrecht London New YorkI ibrary of Congress ContHandbook of information and communication security: Part 1
rol Number: 2009913513© Springer Verlag Berlin Heidelberg 2010I his work is subject to copyright. All rights arc reserved, whether the whole or part oPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1rofilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright law of September 9, 1965. in its current version, and permission for use must always lx obtained from Springer. Violations are liable Handbook of information and communication security: Part 1 to prosecution under the German Copyright Law.Hie use of general descriptive names, registered names, trademarks, etc. in this publication does not iHandbook of information and communication security: Part 1
mply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free forPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1pzig, GermanyPrinted on acid-free paperSpringer IS part of Springer Science* Business Media (www.sprmgcr.com)PrefaceAt its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly Handbook of information and communication security: Part 1into mainstream focus with the so-called “Y2K” issue, the Y2K scare was the fear that computer networks and the systems that are controlled or operateHandbook of information and communication security: Part 1
d by software would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) withPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1 operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment.Hie terrorist attacks of 11 September 2UU1 raised security concerns to a new level. Hie in ternational community responded on at least two fronts; one front being th Handbook of information and communication security: Part 1e transfer of reliable information via secure networks and the other being the collection of information about po tential terrorists. As a sign of thiHandbook of information and communication security: Part 1
s new emphasis on security, since 2001. all major academic publishers have started technical journals focused on security; and every major communicatiPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1 committee on Communication and Information Security.I he first editor was intimately involved with security for the Athens Olympic (fames of 2004. I hese games provided a testing ground for much of the existing security'technology. One lesson learned from these games was that security related techn Handbook of information and communication security: Part 1ology often cannot be used effectively without violating the legal framework. I his problem is discussed - in the context of the Athens Olympics in thHandbook of information and communication security: Part 1
e final chapter of this handbook.In this handbook, we have attempted to emphasize the interplay between communications and the held of information secPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1 important to realize that information security is a large topic - far too large to cover exhaustively within a single volume. Consequently, we cannot claim to provide a complete view of the subject. Instead, we have chosen to include several surveys of some of the most important, interesting, and t Handbook of information and communication security: Part 1imely topics, along with a significant number of research-oriented papers. Many of the research papers are very much on the cutting edge of the field.Handbook of information and communication security: Part 1
Specifically, this handbook covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (includiPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of I Handbook of information and communication security: Part 1 and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics.viPrefaceFinally, we believe this handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for Handbook of information and communication security: Part 1 new material to cover in their security courses, hl addition, the topics in this volume are highly relevant to the real world practice of informationHandbook of information and communication security: Part 1
security, which should make this book a valuable resource for working IT professionals. In short, we believe that this handbook will be a valuable rePeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of IPeter Stavroula kis Mark Stamp EditorsHandbook of Information and Communication SecuritySpringerPeter Stavroulakis • Mark Stamp (Editors)Handbook of IGọi ngay
Chat zalo
Facebook