From this page you can:
Home |
Descriptors



Computer Security / William Stallings
Title : Computer Security : Principles and Practice Material Type: printed text Authors: William Stallings, Author Edition statement: 4th edition Publisher: Boston : Pearson/Addison Wesley Publication Date: 2017 Pagination: 777 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-13-479410-5 General note: Includes bibliographical references and index
Includes bibliographical footnotesLanguages : English (eng) Original Language : English (eng) Descriptors: Computer algorithms
Computer network
Computer security
Data encryptionClass number: 005.8 Abstract: The need for education in computer security and related topics continues to grow at a dramatic rate and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the ‘gold standard’ when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. Contents note: Computer Security Concepts; Threats, Attacks, and Assets; Standards; Computer Security Strategy; Digital User Authentications Principles; Random and Pseudo random Numbers; Access Control Principles; Honeypots; Software Security Issues; Application Security Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=18776 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002138 005.8 Sta-Com 2017 General Collection Library "Max van der Stoel" English Available 1702-002400 005.8 Sta-Com 2017 General Collection SEEU Library Skopje English Available Cryptography engineering / Niels Ferguson
Title : Cryptography engineering : design principles and practical applications Material Type: printed text Authors: Niels Ferguson, Author ; Bruce Schneier, Author Publisher: Indianapolis, IN : Wiley Pub. Inc Publication Date: 2010 Pagination: xxix, 353 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-470-47424-2 General note: Includes bibliographical references (p. 327)
Includes index (p. 339)Languages : English (eng) Original Language : English (eng) Descriptors: Computer security
CryptographyClass number: 005.82 Abstract: Learn to build cryptographic protocols that work in the real world. Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.
That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self study, you will learn to use cryptography effectively in real-world systems.
1. Understand what goes into designing cryptographic protocols
2. Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world.
3. Look beyond the security protocol to see weaknesses in the surrounding system
4. Thwart the adversary by understanding how adversaries think
5. Learn how to build cryptography into new productsContents note: Introduction; The context of cryptography; Introduction to cryptography; Message security; Block ciphers; Block cipher modes; Hash functions; Message authentication codes; The secure channel; Implementation issues; Key negotiation; Generating randomness; Primes; Diffie-Hellman; RSA; Introduction to Cryptographic Protocols; Key Negotiation; Implementation Issues; Key management; The clock; Key servers; The dream of PKI; PKI reality; PKI practicalities; Storing secrets; Miscellanious; Standards and Patents; Involving experts. Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17101 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002442 005.82 Fer-Cry 2010 General Collection SEEU Library Skopje English Due for return by 01/20/2020 Cryptography and Network Security / William Stallings
Title : Cryptography and Network Security : Principles and Practice Material Type: printed text Authors: William Stallings, Author Edition statement: 7th edition Publisher: Boston : Pearson/Addison Wesley Publication Date: 2017 Pagination: 766 p. Layout: ill. Size: 23 cm ISBN (or other code): 978-1-292-15858-7 General note: Includes bibliographical references (p. 744-752)
Includes index (p. 754-766)
Includes bibliographical footnotesLanguages : English (eng) Original Language : English (eng) Descriptors: Computer networks
Computer science
Computer security
Data encryptionClass number: 005.8 Abstract: The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience. Contents note: Computer Security Concepts; Security Attacks; Security Services; A Model for Network Security; Modular Arithmetic; Prime Numbers; Symmetric Cipher Model; The Data Encryption Standard; A DES Example; The Strength of DES; Rings; Fields; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=18775 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002137 005.8 Sta-Cry 2017 General Collection Library "Max van der Stoel" English Available 1702-002399 005.8 Sta-Cry 2017 General Collection SEEU Library Skopje English Available Cybersecurity essentials / Charles J. Brooks
Title : Cybersecurity essentials Material Type: printed text Authors: Charles J. Brooks, Author ; Christopher Grow, Author ; Philip Craig, Author Publisher: Indianapolis, IN : John Wiley & Sons, Inc. Publication Date: 2018 Pagination: xxvi-758 p : illustrations ; 24 cm. Layout: ill Size: 24 cm ISBN (or other code): 978-1-11-936239-5 General note: Includes index Languages : English (eng) Original Language : English (eng) Descriptors: Computer networks - Security measures
Computer securityClass number: 005.8 Abstract: "Cybersecurity essentials"- Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter. Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=18073 Copies
Barcode Call number Media type Location Section Status 1702-002332 005.8 Bro-Cyb 2018 General Collection SEEU Library Skopje English Not for loan Diabolus / Dan Brown
Title : Diabolus : roman Other title : Digital fortress Material Type: printed text Authors: Dan Brown, Author ; Amik Kasoruho, Translator Publisher: Tiranë : Botimet Dudaj Publication Date: 2010 Series: Letërsi bashkëkohore amerikane Pagination: 426 p. Size: 24 cm ISBN (or other code): 978-99943-338-6-8 Price: 1100 lekë Languages : Albanian (sqi) Original Language : English (eng) Descriptors: Computer security
Cryptographers
Intelligence officersClass number: 813.54 Abstract: Dan Brown është diplomuar dhe ka dhënë anglisht në Akademinë Philips Exeter. Kështjella Dixhitale u frymëzua nga prania e papritur e agjentëve të FBI-së në kampusin e Exeterit, për shkak të një kërcënimi të njoftuar nga NSA-ja dy studentë kishin përhapur gjithandej një e-mail duke thënë se Bill Klintoni ishte një gënjeshtar dhe duhej vrarë. Dan Brown është autori i bestsellerit Kodi i Da Vinçit, Engjëj dhe Djaj dhe Mashtrimi i Madh. Ai jeton në New England bashkë me të shoqen. Përpara se të shkruante bestseller-in prej multimiliona kopjesh të shitura rrëmbimthi, "Kodin e Da Vinçit", Dan Brown-i filloi kërkimin e tij me mprehtësi prej bisturie dhe derdhi aftësi prej rëfimtari mbi organizatën më të fuqishme të inteligjencës në tokë: rganizatën Kombëtare të Sigurisë (NSA), një agjenci ultra-sekrete me buxhete miliarda dollarësh dhe shumë herë më e fuqishme se CIA. Kur makina e fuqishme e NSA-së për zbërthimin e kodeve, hasi në një kod misterioz që nuk e zbërthente dot, agjencia thirri kryekriptografen e saj, Sjuzen Fleçer, një matematiciene bukuroshe dhe brilante. Ajo çka zbuloi përcolli valë shoku nëpër korridoret e pushtetit NSA-ja po mbahej peng... jo me armë apo bomba, por nga një kod kompleks gjenial që, nëse zbatohej, do të gjymtonte inteligjencën e SHBA-ve. Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=14513 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 2702-002687 813.54 Bro-DiaA 2010 General Collection Library "Max van der Stoel" Albanian Available 2702-002688 813.54 Bro-DiaA 2010 General Collection SEEU Library Skopje Albanian Available Digital forensics / Andre Arnes
PermalinkDizajnimi dhe Implementimi i Sigurisë në Rrjetet Kompjuterike / Blerton Abazi
PermalinkEnterprise Solution Patterns Using Microsoft® .NET / David Trowbridge
PermalinkHacking for dummies / Kevin Beaver
PermalinkHands-on ethical hacking and network defense / Michael T. Simpson
PermalinkIntrusion detection / Terry Escamilla
PermalinkIT governance / Alan Calder
PermalinkMeasuring and managing information risk / Jack Freund
PermalinkMicrosoft Windows security inside out for Windows XP and Windows 2000 / Ed Bott
Permalink.NET security and cryptography / Peter Thorsteinson
Permalink