Applied Information Security: A Hands-on Approach by David Basin,Patrick Schaller,Michael Schläpfer

By David Basin,Patrick Schaller,Michael Schläpfer

This publication explores basic rules for securing IT structures and illustrates them with hands-on experiments that could be performed by means of the reader utilizing accompanying software program. The experiments spotlight key info safeguard difficulties that come up in glossy working structures, networks, and net functions. The authors clarify the right way to establish and make the most such difficulties they usually express assorted countermeasures and their implementation. The reader therefore earnings an in depth figuring out of the way vulnerabilities come up and functional event tackling them.

After proposing the fundamentals of safeguard ideas, digital environments, and community prone, the authors clarify the middle safety ideas of authentication and entry keep an eye on, logging and log research, internet program safety, certificate and public-key cryptography, and danger administration. The booklet concludes with appendices at the layout of similar classes, record templates, and the fundamentals of Linux as wanted for the assignments.

The authors have effectively taught IT safety to scholars and execs utilizing the content material of this e-book and the laboratory environment it describes. The ebook can be utilized in undergraduate or graduate laboratory classes, complementing extra theoretically orientated classes, and it may possibly even be used for self-study via IT pros who wish hands-on adventure in utilized details defense. The authors' helping software program is freely on hand on-line and the textual content is supported all through with exercises.

Show description

Read Online or Download Applied Information Security: A Hands-on Approach PDF

Similar computer information theory books

Security and Privacy in User Modeling (Human–Computer Interaction Series)

User-adaptive (or "personalized") platforms take person personality­ istics in their present clients into consideration and adapt their habit ac­ cordingly. a number of empirical experiences reveal their merits in parts like schooling and coaching, on-line support for complicated software program, dynamic info supply, provision of machine entry to individuals with dis­ talents, and to some degree details retrieval.

A Computable Universe:Understanding and Exploring Nature as Computation

This quantity, with a foreword by way of Sir Roger Penrose, discusses the principles of computation when it comes to nature. It specializes in major questions: what's computation? How does nature compute? The members are world-renowned specialists who've contributed to shaping a state of the art computational knowing of the universe.

Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity

This booklet takes a clean examine biometrics and id administration, extending the discussion past technical issues, and exploring the various broader societal and philosophical elements surrounding using biometric functions. good points: offers a quick historical past of the improvement of biometrics, and describes the various popularly held misconceptions surrounding the know-how; investigates the demanding situations and chances of biometrics throughout 3rd social gathering infrastructures and on cellular computing units; presents counsel on biometric structures layout; explores the mechanisms essential to allow id intelligence, together with logging mechanisms, facts communications and knowledge codecs; discusses such utilization matters as collaboration frameworks, and messaging and knowledge translation; examines the effect of biometric applied sciences on society, protecting problems with privateness and consumer components; reports the present state of affairs in identification administration, and predicts the place those traits may possibly take us sooner or later.

Physical-Layer Security for Cooperative Relay Networks (Wireless Networks)

This booklet provides physical-layer safeguard as a promising paradigm for reaching the information-theoretic secrecy required for instant networks. It explains how instant networks are super liable to eavesdropping assaults and discusses quite a number safeguard options together with information-theoretic defense, synthetic noise aided protection, security-oriented beamforming, and variety assisted defense techniques.

Additional resources for Applied Information Security: A Hands-on Approach

Sample text

Download PDF sample

Rated 4.74 of 5 – based on 19 votes