Cryptography and Security in Computing
by Jaydip Sen (ed.)
Publisher: InTech 2012
Number of pages: 242
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Home page url
Download or read it online for free here:
by Petter Gottschalk - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
- Microsoft Corporation
The Antivirus Defense-in-Depth Guide provides an overview of the types of malware and their risks, planning an effective antivirus strategy for your organization, and responding quickly and effectively to infections or incidents when they occur.
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.