Applied Information Security: A Hands-on Approach by David Basin,Patrick Schaller,Michael Schläpfer

By David Basin,Patrick Schaller,Michael Schläpfer

This e-book explores primary ideas for securing IT structures and illustrates them with hands-on experiments that could be performed via the reader utilizing accompanying software program. The experiments spotlight key info defense difficulties that come up in sleek working structures, networks, and internet functions. The authors clarify tips on how to determine and make the most such difficulties they usually express assorted countermeasures and their implementation. The reader hence profits an in depth figuring out of ways vulnerabilities come up and useful event tackling them.

After offering the fundamentals of defense rules, digital environments, and community companies, the authors clarify the center defense rules of authentication and entry keep watch over, logging and log research, net software safety, certificate and public-key cryptography, and danger administration. The ebook concludes with appendices at the layout of similar classes, file templates, and the fundamentals of Linux as wanted for the assignments.

The authors have effectively taught IT safeguard to scholars and pros utilizing the content material of this publication and the laboratory environment it describes. The publication can be utilized in undergraduate or graduate laboratory classes, complementing extra theoretically orientated classes, and it could actually even be used for self-study through IT pros who wish hands-on adventure in utilized info safeguard. The authors' assisting software program is freely on hand on-line and the textual content is supported all through with exercises.

Show description

Read or Download Applied Information Security: A Hands-on Approach PDF

Similar computer information theory books

Media Computing: Computational Media Aesthetics (The International Series in Video Computing)

Usually, clinical fields have outlined obstacles, and scientists paintings on learn difficulties inside of these obstacles. notwithstanding, at times these barriers get shifted or blurred to conform new fields. for example, the unique target of computing device imaginative and prescient used to be to appreciate a unmarried photograph of a scene, through choosing items, their constitution, and spatial preparations.

Interference Cancellation Using Space-Time Processing and Precoding Design: 206 (Signals and Communication Technology)

Interference Cancellation utilizing Space-Time Processing and Precoding layout introduces unique layout ways to in attaining interference cancellation, low-complexity deciphering and whole variety for a chain of multi-user platforms. In multi-user environments, co-channel interference will lower the functionality of instant communications platforms.

Topics in Cryptology –- CT-RSA 2015: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings (Lecture Notes in Computer Science)

This ebook constitutes the refereed complaints of the Cryptographer's song on the RSA convention 2015, CT-RSA 2015, held in San Francisco, CA, united states, in April 2015. The 26 papers awarded during this quantity have been rigorously reviewed and chosen from 111 submissions. the focal point of the music is on following matters: timing assaults, layout and research of block ciphers, characteristic and id dependent encryption, club, safe and effective implementation of AES established Cryptosystems, selected ciphertext assaults in concept and perform, algorithms for fixing not easy difficulties, structures of hash features and message authentication codes, safe multiparty computation, authenticated encryption, detecting and tracing malicious actions, implentation assaults on exponentiation algorithms and homomorphic encryption and its functions.

Electronic Government and the Information Systems Perspective: 6th International Conference, EGOVIS 2017, Lyon, France, August 28-31, 2017, Proceedings (Lecture Notes in Computer Science)

This ebook constitutes the refereed lawsuits of the sixth International Conference on digital executive and the knowledge Systems Perspective, EGOVIS 2017, held in Lyon, France, in August 2017. The 20 revised complete papers presented were conscientiously reviewed and chosen from 24 submissions. The papers areorganized within the following topical sections: digitalization and transparency; open facts ecosystems; clever structures in e-government; e-government examine and clever structures; m-government and inclusion; e-government situations - info wisdom administration; and data administration within the context of e-government.

Extra info for Applied Information Security: A Hands-on Approach

Sample text

Download PDF sample

Rated 4.27 of 5 – based on 12 votes