Date


People

Output Type

Download Available

Dewey Decimal

8 results

Security and forensic computing: encryption.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: encryption
3 ENCRYPTION 90 3.1 Introduction 90 3.2 Simple cipher methods 91 3.3 Encryption operators 94 3.4 Key-based cryptography 96 3.5 Brute-force analysis 103 3.6 Public-key, private...

Security and forensic computing: software security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: software security
5 ENHANCED SOFTWARE SECURITY 163 5.1 Introduction 163 5.2 Integrating security into applications 164 5.3 Good practice 165 5.4 The future of software 165 5.5 .NET environment ...

Security and forensic computing: introduction to computer security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: introduction to computer security
1 INTRODUCTION 14 1.1 The Industrial and the Information Age 14 1.2 CIA and AAA 15 1.3 Protecting against intruders 16 1.4 Users, systems and data 17 1.5 Security and Forensic...

Security and forensic computing: authentication.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: authentication
4 AUTHENTICATION, HASHING AND DIGITAL CERTIFICATES 130 4.1 Introduction 130 4.2 Methods of authentication 132 4.3 Biometrics 134 4.4 Message hash 136 4.5 Authenticating the s...

Security and forensic computing: network security.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: network security
6 NETWORK SECURITY ELEMENTS 186 6.1 Introduction 186 6.2 Router (packet filtering) firewalls 186 6.3 Network address translation 196 6.4 PIX/ASA firewall 203 6.5 Proxy servers...

Security and forensic computing: forensic computing.

Digital Artefact
Buchanan, W. J. (2010)
Security and forensic computing: forensic computing
7 FORENSIC COMPUTING 217 7.1 Introduction 217 7.2 Legal infrastructure 217 7.3 Computer Forensics 218 7.4 Is it true or not? 219 7.5 Identity details 222 7.6 One-time password...

Advanced security and network forensics: cloud computing.

Digital Artefact
Buchanan, W. J. (2010)
Advanced security and network forensics: cloud computing
6 CLOUD/GRID COMPUTING 6.1 Objectives 6.2 Introduction 6.3 Grid Computing 6.3.2 Grid middleware 6.3.1 Grid computing applications Distributed.net 6.4 Cloud Computing ...

Security and forensic computing: intrusion detection systems.

Digital Artefact
Buchanan, W. J. (2009)
Security and forensic computing: intrusion detection systems
2 INTRUSION DETECTION SYSTEMS 50 2.1 Introduction 50 2.2 Types of intrusion 53 2.3 Attack patterns 54 2.4 Host/network-based intrusion detection 55 2.5 Placement of the IDS 57...