Handbook of information and communication security: Part 1
Số trang: 409
Loại file: pdf
Dung lượng: 8.24 MB
Lượt xem: 11
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
(BQ) The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is divided into 2 parts, part 1 from chapter 1 to chapter 20.
Nội dung trích xuất từ tài liệu:
Handbook of information and communication security: Part 1 Handbook of Information and Communication Security Peter Stavroulakis · Mark Stamp (Editors) Handbook of Information and Communication Security 123 Editors Prof. Peter Stavroulakis Prof. Mark Stamp Technical University of Crete Dept. Computer Science 73132 Chania, Crete San Jose State University Greece One Washington Square pete_tsi@yahoo.gr San Jose, CA 95192 USA stamp@cs.sjsu.edu ISBN 978-3-642-04116-7 e-ISBN 978-3-642-04117-4 DOI 10.1007/978-1-84882-684-7 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2009943513 © Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover illustration: Teodoro Cipresso Cover design: WMXDesign, Heidelberg Typesetting and production: le-tex publishing services GmbH, Leipzig, Germany Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Preface At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. The Y2K scare was the fear that com- puter networks and the systems that are controlled or operated by software would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work co- operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. The terrorist attacks of 11 September 2001 raised security concerns to a new level. The in- ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about po- tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communica- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. The first editor was intimately involved with security for the Athens Olympic Games of 2004. These games provided a testing ground for much of the existing security technology. One lesson learned from these games was that security-related technology often cannot be used effectively without violating the legal framework. This problem is discussed – in the context of the Athens Olympics – in the final chapter of this handbook. In this handbook, we have attempted to emphasize the interplay between communications and the field of information security. Arguably, this is the first time in the security literature that this duality has been recognized in such an integral and explicit manner. It is important to realize that information security is a large topic – far too large to cover exhaustively within a single volume. Consequently, we cannot claim to provide a complete view of the subject. Instead, we have chosen to include several surveys of some of the most important, interesting, and timely topics, along with a significant number of research-oriented papers. Many of the research papers are very much on the cutting edge of the field. Specifically, this handbook covers some of the latest advances in fundamentals, cryptogra- phy, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors’ intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. v vi Preface Finally, we believe this handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for new material to cover in their security courses. In addition, the topics in this volume are highly relevant to the real world practice of information security, which should make this book a valuable resource for working IT professionals. In short, we believe that this handbook will be a valuable resource for a diverse audience for many years to come. Mark Stamp ...
Nội dung trích xuất từ tài liệu:
Handbook of information and communication security: Part 1 Handbook of Information and Communication Security Peter Stavroulakis · Mark Stamp (Editors) Handbook of Information and Communication Security 123 Editors Prof. Peter Stavroulakis Prof. Mark Stamp Technical University of Crete Dept. Computer Science 73132 Chania, Crete San Jose State University Greece One Washington Square pete_tsi@yahoo.gr San Jose, CA 95192 USA stamp@cs.sjsu.edu ISBN 978-3-642-04116-7 e-ISBN 978-3-642-04117-4 DOI 10.1007/978-1-84882-684-7 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2009943513 © Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover illustration: Teodoro Cipresso Cover design: WMXDesign, Heidelberg Typesetting and production: le-tex publishing services GmbH, Leipzig, Germany Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Preface At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. The Y2K scare was the fear that com- puter networks and the systems that are controlled or operated by software would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work co- operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. The terrorist attacks of 11 September 2001 raised security concerns to a new level. The in- ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about po- tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communica- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. The first editor was intimately involved with security for the Athens Olympic Games of 2004. These games provided a testing ground for much of the existing security technology. One lesson learned from these games was that security-related technology often cannot be used effectively without violating the legal framework. This problem is discussed – in the context of the Athens Olympics – in the final chapter of this handbook. In this handbook, we have attempted to emphasize the interplay between communications and the field of information security. Arguably, this is the first time in the security literature that this duality has been recognized in such an integral and explicit manner. It is important to realize that information security is a large topic – far too large to cover exhaustively within a single volume. Consequently, we cannot claim to provide a complete view of the subject. Instead, we have chosen to include several surveys of some of the most important, interesting, and timely topics, along with a significant number of research-oriented papers. Many of the research papers are very much on the cutting edge of the field. Specifically, this handbook covers some of the latest advances in fundamentals, cryptogra- phy, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors’ intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. v vi Preface Finally, we believe this handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for new material to cover in their security courses. In addition, the topics in this volume are highly relevant to the real world practice of information security, which should make this book a valuable resource for working IT professionals. In short, we believe that this handbook will be a valuable resource for a diverse audience for many years to come. Mark Stamp ...
Tìm kiếm theo từ khóa liên quan:
Communication security Information security System security Public-key cryptography Elliptic curve cryptography Chaos-based information securityGợi ý tài liệu liên quan:
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 265 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 44 0 0 -
Lecture Data security and encryption - Chapter 9: Public-key cryptography and RSA
69 trang 40 0 0 -
Methods of public-key cryptography
26 trang 34 0 0 -
Speeding up data processing on firewall using FPGA
10 trang 33 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 2
193 trang 31 0 0 -
Lecture Data security and encryption - Chapter 16: RSA
57 trang 30 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 1
183 trang 30 0 0 -
Lecture Professional Practices in IT: Lecture 29
12 trang 28 0 0 -
Ebook PGP & GPG email for the practical paranoid
216 trang 28 0 0