Securing Information and Communications Systems
Book Details :
Size4.02 MB

Securing Information and Communications Systems

Securing Information and Communications Systems Principles, Technologies, and Applications | PDF Free Download.

Securing Information and Communications Systems Contents

  • CHAPTER 1 Introduction
  • CHAPTER 2 Security Concepts, Services, and Threats 
  • CHAPTER 4 User Authentication Technologies 
  • CHAPTER 5 Authorization and access control
  • CHAPTER 6 Data-Centric Applications 
  • CHAPTER 7 Modern Cryptology 
  • CHAPTER 8 Network Security 
  • CHAPTER 9 Standard Public Key and Privilege Management Infrastructures 
  • CHAPTER 10 Smart Cards and Tokens 
  • CHAPTER 11 Privacy and Privacy-Enhancing Technologies 
  • CHAPTER 12 Content Filtering Technologies and the Law 
  • CHAPTER 13 Model for Cybercrime Investigations 
  • CHAPTER 14 Systemic-Holistic Approach to ICT Security 
  • CHAPTER 15 Electronic Voting Systems
  • CHAPTER 16 On Mobile Wiki Systems Security

Preface to Securing Information and Communications Systems

The idea for this book was born within a series of courses of a pan-European collaboration that has successfully been delivered at Master’s-level intensive programs since 1997 at a variety of European venues,

Such as Greece (Samos and Chios), Sweden (Stockholm), Finland (Oulu), Spain (Malaga), Austria (Graz), Belgium (Leuven), and the United Kingdom (Glarmorgan).

The course is scheduled to be held in Regensburg, Germany, during 2008. Its title is Intensive Program on Information and Communication Security (IPICS),

and it is based on a comprehensive IT/ICT security curriculum that was itself devised as part of an EU collaborative project under the ERASMUS program. IPICS has a long and distinguished history.

It grew from a simple idea to a very complex undertaking. It has been maintained with minimum financial support but great enthusiasm and commitment by the lecturers who gave their time and effort at free will and without any form of payment.

The participating institutions also ensured that they sent very good students to take full advantage of not only IPICS courses but also learning and experiencing the culture and traditions in the country or town where the school was held. It was also fun and fostered long-term friendships.

During this period, a large number of people (expert lecturers, administrators, students, sponsors, and so on) have contributed to the evolution of this book, and we’d like to thank everyone, particularly this book’s participating authors, who turned their lecture notes into text to benefit the readers.

The interactions and constructive discussions between students and lecturers, and between lecturers, have certainly resulted in improvements in the delivery of course material in subsequent IPICS schools.

We’d also like to thank the commissioning editorial staff at Artech House for their support and help in this book.

We thank the independent reviewers for their comments, thoughtful criticisms, and suggestions—they have been invaluable.

We also thank Alexandros Tsakountakis, graduate student at the Department of Information and Communication Systems Engineering, University of the Aegean, Greece, for his invaluable support during the stage of the preparation of the final manuscript.

Last, but not least, on behalf of the whole IPICS team (expert lecturers and assistants), we thank our families and associates,

who tolerated our absence from time to time when lecturing at IPICS schools and during the last few months when the book was being written and compiled under enormous time constraints and pressure.

Download Securing Information and Communications Systems in PDF Format For Free.