Apress Access

Computer Security in the 21st Century

By D.T. Lee , S. P. Shieh , J. Doug Tygar

  • eBook Price: $129.00
Buy eBook Buy Print Book

Computer Security in the 21st Century Cover Image

  • Add to Wishlist
  • ISBN13: 978-0-3872-4005-3
  • 280 Pages
  • User Level: Science
  • Publication Date: December 5, 2005
  • Available eBook Formats: PDF
Full Description
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of : - Fundamental new security - Cryptographic protocols and design, - A new way of measuring network vulnerability: attack surfaces, - Network vulnerability and building impenetrable systems, - Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Table of Contents

Table of Contents

  1. Introduction. Part I: Security Protocol Design. Challenges in Protocol Design and Analysis. Private Matching. Authentication Protocol Analysis. Self
  2. certified Approach for Authenticated Key Agreement.
  3. Part II: P2P and ad Hoc Networks. Experimenting with Admission Control in P2P Networks. Adaptive Random Key Distribution Schemes for Wireless Sensor Networks.
  4. Part III: Intrusion Detection, Defense, Measurement. Measuring Relative Attack Surfaces. A Modeling of Intrusion Detection System with Identification Capability. A Source
  5. End Defense System against DDoS Attacks. BEAGLE: Tracking System Failures for Reproducing Security Faults.
  6. Part IV: Multimedia Security. Web Application Security
  7. Past, Present, and Future. Securing JPEG2000 Code Streams. A Secret Information Hiding Scheme Based on Switching Tree Coding.

If you think that you've found an error in this book, please let us know by emailing to editorial@apress.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed.
No errata are currently published