Online Library TheLib.net » Fundamentals of Computer Security

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.




This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.


This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
Content:
Front Matter....Pages i-xx
Introduction....Pages 1-10
Background Theory....Pages 11-67
Private-Key Cryptosystems....Pages 69-170
Public-Key Cryptosystems....Pages 171-218
Pseudorandomness....Pages 219-242
Hashing....Pages 243-281
Digital Signatures....Pages 283-305
Authentication....Pages 307-325
Secret Sharing....Pages 327-351
Group-Oriented Cryptography....Pages 353-377
Key Establishment Protocols....Pages 379-407
Zero-Knowledge Proof Systems....Pages 409-431
Identification....Pages 433-458
Intrusion Detection....Pages 459-497
Electronic Elections and Digital Money....Pages 499-524
Database Protection and Security....Pages 525-564
Access Control....Pages 565-589
Network Security....Pages 591-629
Back Matter....Pages 631-677


This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
Content:
Front Matter....Pages i-xx
Introduction....Pages 1-10
Background Theory....Pages 11-67
Private-Key Cryptosystems....Pages 69-170
Public-Key Cryptosystems....Pages 171-218
Pseudorandomness....Pages 219-242
Hashing....Pages 243-281
Digital Signatures....Pages 283-305
Authentication....Pages 307-325
Secret Sharing....Pages 327-351
Group-Oriented Cryptography....Pages 353-377
Key Establishment Protocols....Pages 379-407
Zero-Knowledge Proof Systems....Pages 409-431
Identification....Pages 433-458
Intrusion Detection....Pages 459-497
Electronic Elections and Digital Money....Pages 499-524
Database Protection and Security....Pages 525-564
Access Control....Pages 565-589
Network Security....Pages 591-629
Back Matter....Pages 631-677
....
Download the book Fundamentals of Computer Security for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen