Cryptography and Security in Computing
by Jaydip Sen (ed.)
Publisher: InTech 2012
Number of pages: 242
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Home page url
Download or read it online for free here:
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.