Product code: Information Security by hotsell Mark Stamp
Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and hotsell compartments Discusses software tools used for malware detection, digital rights management, and operating systems security Includes an instructor's solution manual, PowerPoint slides, lecture videos, and additional teaching resources.
Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and hotsell compartments Discusses software tools used for malware detection, digital rights management, and operating systems security Includes an instructor's solution manual, PowerPoint slides, lecture videos, and additional teaching resources.