This unique book explains the basic issues of classical and modern cryptography, and provides a self contained essential mathematical background in number theory, abstract algebra, and probability—with surveys of relevant parts of complexity theory and other things. A user-friendly, down-to-earth tone presents concretely motivated introductions to these topics. More detailed chapter topics include simple ciphers; applying ideas from probability; substitutions, transpositions, permutations; modern symmetric ciphers; the integers; prime numbers; powers and roots modulo primes; powers and roots for composite moduli; weakly multiplicative functions; quadratic symbols, quadratic reciprocity; pseudoprimes; groups; sketches of protocols; rings, fields, polynomials; cyclotomic polynomials, primitive roots; pseudo-random number generators; proofs concerning pseudoprimality; factorization attacks finite fields; and elliptic curves. For personnel in computer security, system administration, and information systems.
Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. This book can be used in executive training programs, or by anyone interested in learning the practical side of IT security.
For introductory courses in IT Security.
A strong business focus through a solid technical presentation of security tools.
Continue reading “Corporate Computer Security (4th Edition)”
Digital Crime and Digital Terrorism, Second Edition, is written for students and practitioners with a beginning interest in studying crimes and terrorist acts committed using digital technology. This user-friendly book offers a conversational writing style that distills complex technical concepts and issues to make them accessible to even the most technologically challenged reader. Issues addressed in the book include descriptions of the types of crimes and terrorist acts committed using computer technology, theories addressing hackers and other types of digital criminals, an overview of the legal strategies and tactics targeting this type of crime, and in-depth coverage of investigating and researching digital crime and digital terrorism. Some new features to this edition include: Added significant material relating to the use of electronic communication and the Internet by terrorist groups, both domestically and in