Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy) Review

Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security and Privacy)
Average Reviews:

(More customer reviews)
I purchased this as an additional reference book for a graduate class (cryptography) in Information Assurance particularly because our textbook is from 1996. This book presents the materials we cover in class in a much better format than the textbook (Schneier, Applied Cryptography) which keeps referring the reader to materials from other chapters so you are jumping all over the place). While Schneier is better for me since I do not have a heavy mathematics background, this book would be better for those students who do. I found it to present cryptographic mathematical principles more than a narrative explanation. So, if you can do the math, it is a good reference book.

Click Here to see more reviews about: Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Written by an international team of experts, this one-stop reference maps out the latest user authentication methods, as well as authorization and access controls and their applications in today's database systems. The book addresses network security in depth, offering a fresh look at anti-intrusion approaches, intrusion detection systems, authentication and authorization infrastructures, identity certificates, smart cards, and tokens.

Buy Now

Click here for more information about Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)

0 comments:

Post a Comment