Text
Information security: principle and practice
Contents:
I INTRODUCTION
1 Crypto
2 Crypto basics
3 Symmetric key crypto
4 Public key crypto
5 Hash function and other topics
6 Advanced cryptanalysis
II ACCESS CONTROL
7 Authentication
8 Authorization
III PROTOCOLS
9 Simple authention protocols
10 Real-world security protocols
IV SOFTWARE
11 Software flaw and malware
12 Insecurity in software
13 Operating systems and security
No other version available