Fundamentals of Computer Security:
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, a...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2003
|
Ausgabe: | 1st ed. 2003 |
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-3-662-07324-7 https://doi.org/10.1007/978-3-662-07324-7 |
Zusammenfassung: | This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material |
Umfang: | 1 Online-Ressource (XX, 677 p) |
ISBN: | 9783662073247 |
DOI: | 10.1007/978-3-662-07324-7 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064701 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 xx o|||| 00||| eng d | ||
020 | |a 9783662073247 |9 978-3-662-07324-7 | ||
024 | 7 | |a 10.1007/978-3-662-07324-7 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-662-07324-7 | ||
035 | |a (OCoLC)1227480496 | ||
035 | |a (DE-599)BVBBV047064701 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Pieprzyk, Josef |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fundamentals of Computer Security |c by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry |
250 | |a 1st ed. 2003 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2003 | |
300 | |a 1 Online-Ressource (XX, 677 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information theory | |
650 | 4 | |a Computer communication systems | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Hardjono, Thomas |4 aut | |
700 | 1 | |a Seberry, Jennifer |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642077135 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783540431015 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783662073254 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-07324-7 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032471813 | |
966 | e | |u https://doi.org/10.1007/978-3-662-07324-7 |l DE-706 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818987567935127552 |
---|---|
any_adam_object | |
author | Pieprzyk, Josef Hardjono, Thomas Seberry, Jennifer |
author_facet | Pieprzyk, Josef Hardjono, Thomas Seberry, Jennifer |
author_role | aut aut aut |
author_sort | Pieprzyk, Josef |
author_variant | j p jp t h th j s js |
building | Verbundindex |
bvnumber | BV047064701 |
classification_rvk | ST 273 ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-662-07324-7 (OCoLC)1227480496 (DE-599)BVBBV047064701 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-07324-7 |
edition | 1st ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03714nam a2200721zc 4500</leader><controlfield tag="001">BV047064701</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662073247</subfield><subfield code="9">978-3-662-07324-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-07324-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-07324-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480496</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fundamentals of Computer Security</subfield><subfield code="c">by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 677 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hardjono, Thomas</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seberry, Jennifer</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642077135</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540431015</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662073254</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-07324-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471813</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-07324-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064701 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:08:45Z |
institution | BVB |
isbn | 9783662073247 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471813 |
oclc_num | 1227480496 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XX, 677 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
spelling | Pieprzyk, Josef Verfasser aut Fundamentals of Computer Security by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry 1st ed. 2003 Berlin, Heidelberg Springer Berlin Heidelberg 2003 1 Online-Ressource (XX, 677 p) txt rdacontent c rdamedia cr rdacarrier This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material Systems and Data Security Data Structures and Information Theory Cryptology Coding and Information Theory Computer Communication Networks Computer security Data structures (Computer science) Data encryption (Computer science) Coding theory Information theory Computer communication systems Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s Hardjono, Thomas aut Seberry, Jennifer aut Erscheint auch als Druck-Ausgabe 9783642077135 Erscheint auch als Druck-Ausgabe 9783540431015 Erscheint auch als Druck-Ausgabe 9783662073254 https://doi.org/10.1007/978-3-662-07324-7 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Pieprzyk, Josef Hardjono, Thomas Seberry, Jennifer Fundamentals of Computer Security Systems and Data Security Data Structures and Information Theory Cryptology Coding and Information Theory Computer Communication Networks Computer security Data structures (Computer science) Data encryption (Computer science) Coding theory Information theory Computer communication systems Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)4070085-9 |
title | Fundamentals of Computer Security |
title_auth | Fundamentals of Computer Security |
title_exact_search | Fundamentals of Computer Security |
title_full | Fundamentals of Computer Security by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry |
title_fullStr | Fundamentals of Computer Security by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry |
title_full_unstemmed | Fundamentals of Computer Security by Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry |
title_short | Fundamentals of Computer Security |
title_sort | fundamentals of computer security |
topic | Systems and Data Security Data Structures and Information Theory Cryptology Coding and Information Theory Computer Communication Networks Computer security Data structures (Computer science) Data encryption (Computer science) Coding theory Information theory Computer communication systems Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Systems and Data Security Data Structures and Information Theory Cryptology Coding and Information Theory Computer Communication Networks Computer security Data structures (Computer science) Data encryption (Computer science) Coding theory Information theory Computer communication systems Computersicherheit Kryptosystem Kryptologie Rechnernetz |
url | https://doi.org/10.1007/978-3-662-07324-7 |
work_keys_str_mv | AT pieprzykjosef fundamentalsofcomputersecurity AT hardjonothomas fundamentalsofcomputersecurity AT seberryjennifer fundamentalsofcomputersecurity |