With the popularity of the wireless LAN standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues.
With the popularity of the wireless LAN standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN)...
The primary goal of this book is to present the basic concepts in computer and networksecurity.Thestartingpointforthebookwasthelecturenotesthatwere used for teaching the undergraduate course on computer security at the U- versity of Wollongong (Australia). Later more topics were added to the book. Thesetopics weremainlytaught topostgraduatestudentsasanadvancedcr- tography course. Some chapters, especially those towards the end of the book, were included to help students in their seminar presentations. The book was recently used as the textbook for a new course, Cryptography and Infor- tion...
The primary goal of this book is to present the basic concepts in computer and networksecurity.Thestartingpointforthebookwasthelecturenotesthatwere us...
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system....
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer securi...