Database Protection and Security
Database management systems are an important part of the operations of most computerized organizations. In many instances the data held within a database carry more value than the hardware and software used to manage and maintain the data. Consequently th
- PDF / 4,083,701 Bytes
- 686 Pages / 481.89 x 691.654 pts Page_size
- 70 Downloads / 210 Views
Springer-Verlag Berlin Heidelberg GmbH
Josef Pieprzyk Thomas Hardjono Jennifer Seberry
Fundamentals of Computer Security With 98 Figures
123
Prof. Dr. Josef Pieprzyk Macquarie University Department of Computing Sydney, NSW 2109 Australia [email protected]
Dr. Thomas Hardjono VeriSign INC. 401 Edgewater Place, Suite 280 Wakefield, MA 01880 USA [email protected]
Prof. Dr. Jennifer Seberry University of Wollongong School of Information Technology and Computer Science Wollongong, NSW 2522 Australia [email protected]
Cataloging-in-Publication Data applied for Bibliographic information published by Die Deutsche Bibliothek Die Deutsche Bibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data is available in the Internet at http://dnb.ddb.de
ISBN 978-3-642-07713-5 ISBN 978-3-662-07324-7 (eBook) DOI 10.1007/978-3-662-07324-7 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag Berlin Heidelberg GmbH. Violations are liable for prosecution under the German Copyright Law.
http://www.springer.de © Springer-Verlag Berlin Heidelberg 2003 Originally published by Springer-Verlag Berlin Heidelberg New York in 2003 Softcover reprint of the hardcover 1st edition 2003 The use of general descriptive names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and therefore free for general use. Cover Design: KünkelLopkaWerbeagentur Typesetting: Camera ready by authors Printed on acid-free paper SPIN: 10859891
45/3142/X0 - 5 4 3 2 1 0
Preface
The primary goal of this book is to present the basic concepts in computer and network security. The starting point for the book was the lecture notes that were used for teaching the undergraduate course on computer security at the University of Wollongong (Australia). Later more topics were added to the book. These topics were mainly taught to postgraduate students as an advanced cryptography course. Some chapters, especially those towards the end of the book, were included to help students in their seminar presentations. The book was recently used as the textbook for a new course, Cryptography and Information Security, offered for third-year students in the Computing Department at Macquarie University (Australia). The book contains 18 chapters. It starts with an introductory chapter (Chap. 1) that gives a brief summary of the history of cryptography. As the book is meant to be self-contained, the necessary background knowledge is given in the theory chapter (Ch
Data Loading...