Computer and information security, and cryptography - QUT Library ... [PDF]

Jul 19, 2017 - Call numbers group similar subjects and topics together on the library shelves. QUT library uses the Dewe

2 downloads 25 Views 719KB Size

Recommend Stories


PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

Read PdF Cryptography and Network Security
Don't be satisfied with stories, how things have gone with others. Unfold your own myth. Rumi

Read PDF Cryptography and Network Security
Don't count the days, make the days count. Muhammad Ali

Download PDF Cryptography And Network Security
Where there is ruin, there is hope for a treasure. Rumi

Computer Programming and Cryptography Instructor
So many books, so little time. Frank Zappa

QUT Merchandise PDF External QUT
Happiness doesn't result from what we get, but from what we give. Ben Carson

ECE 646 Cryptography and Computer Network Security Fall 2015
You have to expect things of yourself before you can do them. Michael Jordan

Security Issues on Cryptography and Network Security
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

Idea Transcript


Library

Search this Group

Search

Library Subject Guides / Computer and information security, and cryptography / Books and more

Books and more

Computer and information security, and cryptography

Quick and Smart Catalogue Searching

Books and more

Quick: Use any keyword(s) or beginning title words to search, locate and access books, ebooks, DVD's and other library resources. Reference Works

Keyword(s)



All Formats

Search

Databases Smart: Once you have found a highly relevant item, use the assigned subject terms (or 'tags') to locate similar items. You can also browse subject lists. For example, by navigating from 'Computer security' to 'Computer security Australia'.

Standards for Information Security Journals and Conference Proceedings Web sources

Computer security

Firewalls (computer security)

Data protection

Electronic intelligence

Cryptography

Computers - law and legislation

Electronic surveillance

Computer networks - security measures

Data encryption

Database security





Hint: For even greater flexibility, use the drop-down menus in Advanced Search, enter the subject, and then add keywords to other search boxes to refine your search.

Call Numbers Call numbers group similar subjects and topics together on the library shelves. QUT library uses the Dewey decimal classification system as the base for building our call numbers. Check out how the call number system works... Likely call numbers where you could browse the library shelves for works on computer and information security include: 003.54 Cryptography 005.8 Computer security 658.478 Security measures for business enterprise networks



Finding an item on the shelf

New Titles Received on Computer Security Recently received titles on computer and information security. Hacking with Kali [electronic resource] : Practical Penetration Testing Techniques What every engineer should know about cyber security and digital forensics [electronic resource] / Joanna F. DeFranco. Social Media Security [electronic resource] : Leveraging Social Networking While Mitigating Risk Eleventh Hour CISSP [electronic resource] : Study Guide Kali Linux : assuring security by penetration testing / Lee Allen, Tedi Heriyanto, Shakeel Ali. Conducting Network Penetration and Espionage in a Global Environment [electronic resource]. Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually / Kevin Cardwell ; cover image by Tony Shi. Ethical Hacking and Penetration Testing Guide [electronic resource]. Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs ; cover image by Robert W. Beggs. Trustworthy global computing [electronic resource] : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013 : revised selected papers / Martín Abadi, Alberto Lluch Lafuente (eds.). Cyber Security Management [electronic resource] : A Governance, Risk and Compliance Framework. Hacking and Penetration Testing with Low Power Devices [electronic resource]. IH & MMSec'14 [electronic resource] : proceedings of the 2014 ACM Information Hiding and Multimedia Security Workshop : June 11-13, 2014, Salzburg, Austria / sponsored by: ACM SIGMM. CSA guide to cloud computing : implementing cloud privacy and security / Raj Samani, Jim Reavis, Brian Honan ; Vladimir Jirasek, technical editor. Computer security : principles and practice / William Stallings, Lawrie Brown,, UNSW Canberra at the Australian Defence Force Academy. Website Feed

Recommended for...

This guide is highly recommended for students enrolled in: CAB240 - Information Security IFN511 - Security Management

Computer & Information Security Books in the Library Data protection from insider threats by Elisa Bertino Publication Date: 2012 via Synthesis Digital Library of Engineering and Computer Science (Synthesis Lectures on Data Management) As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information while still allowing them to do their jobs. This book discusses several techniques that can provide effective protection against attacks posed by people working on the inside of an organization. Just a small sample of print books held by, and eBooks accessible from, QUT Library. The Myths of security : what the computer security industry doesn't want you to know by John Viega Publication Date: 2009 Provocative, insightful, and always controversial former chief security architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. Few people take the time to understand the situation and protect themselves accordingly. This book tells you: Why it's easier for bad guys to "own" your computer than you think; Why anti-virus software doesn't work well -- and one simple way to fix it; Whether Apple OS X is more secure than Windows; What Windows needs to do better; How to make strong authentication pervasive; Why patch management is so bad; Whether there's anything you can do about identity theft; Five easy steps for fixing application security, and more. Operating system security by Trent Jaeger Publication Date: 2008 via Synthesis Digital Library of Engineering and Computer Science (Synthesis Lectures on Information Security, Privacy, and Trust) Outlines the requirements for a secure operating system. Covers: Access Control Fundamentals / Multics / Security in Ordinary Operating Systems / Verifiable Security Goals / Security Kernels / Securing Commercial Operating Systems / Case Study: Solaris Trusted Extensions / Case Study: Building a Secure Operating System for Linux / Secure Capability Systems / Secure Virtual Machine Systems / System Assurance. Security monitoring by Chris Fry & Martin Nystrom Publication Date: 2009 via EBL Demonstrates how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them., and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security in an IPv6 environment by Daniel Minoli Publication Date: 2008 via EBL rnet Protocol Version 6 (IPv6) and security in this environment. Beautiful security : leading security experts explain how they think. by Andy Oram Publication Date: 2009 eBook from EBL Essays and analysis on topics including:the underground economy for personal information, the relationships among criminals, how social networking, cloud computing, and other popular trends help or hurt our online security, how metrics, requirements gathering, design, and law can take security to a higher level. Introduction to computer security by Matt Bishop Publication Date: 2005 Clear and useful introduction to the art and science of information security. Realistic examples will help students understand the crucial links between security theory and the day-to-day security challenges of IT environments. Explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes: Confidentiality, integrity, and availability; Operational issues, cost-benefit and risk analyses, legal and human factors; Planning and implementing effective access control; Defining security, confidentiality, and integrity policies; Using cryptography and public-key systems, and recognizing their limits; Understanding and using authentication: from passwords to biometrics; Security design principles: least-privilege, failsafe defaults, open design, economy of mechanism, and more; Controlling information flow through systems and networks; Assuring security throughout the system lifecycle; Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defences against them; Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention; Applying security principles to networks, systems, users, and programs. Introduction to Computer Security by Michael Goodrich; Roberto Tamassia Publication Date: 2011 Intended audience: undergraduates. Does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Looks instead at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures. Computer security literacy : staying safe in a digital world by Douglas Jacobson; Joseph Idziorek Publication Date: 2013 Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital Worldfocuses on practical security topics that users are likely to encounter on a regular basis. Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. The authors offer practical computer security knowledge on a range of topics, including social engineering, email, and online shopping, and present best practices pertaining to passwords, wireless networks, and suspicious emails. They also explain how security mechanisms, such as antivirus software and firewalls, protect against the threats of hackers and malware. While information technology has become interwoven into almost every aspect of daily life, many computer users do not have practical computer security knowledge. This hands-on, in-depth guide helps anyone interested in information technology to better understand the practical aspects of computer security and successfully navigate the dangers of the digital world. Principles of information security, 4th ed by Michael E. Whitman; Herbert J. Mattord Publication Date: 2012 Explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Readers can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field. Information security management metrics Publication Date: 2009 How to develop metrics to assure information systems are functioning, secure, and supportive of the organisation’s business objectives. Provides overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments.

Information security governance Publication Date: 2009 Step-by-step approach to developing and managing an effective information security program.

Security in RFID and sensor networks Publication Date: 2009 Discusses current security issues that threaten the effective use of RFID technology and proposes solutions.

Start looking for resources in computer and information security, and cryptography. Last Updated: Jul 19, 2017 4:55 PM

URL: http://libguides.library.qut.edu.au/infosecure

Print Page

Subjects: Information technology / Computer science Tags: computer security, cryptography, ifn511, inb255, information security, it23, it43, software protection

QUT Home

Current students

Current staff

QUT Blackboard

Library

CRICOS (Commonwealth Register of Institutions and Courses for Overseas Students) No. 00213J ABN (Australian Business Number) 83 791 724 622 Accessibility

Copyright

Disclaimer

Privacy

Right to Information

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Australia License.

Login to LibApps

Acknowledgement of Traditional Owners QUT acknowledges the Traditional Owners of the lands where QUT now stands.

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.