Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
5,203
result(s) for
"Telecommunication - Security measures"
Sort by:
Communication System Security
by
Gong, Guang
,
Chen, Lidong
in
Security measures
,
Telecommunication
,
Telecommunication -- Security measures
2012
Helping current and future system designers take a more productive approach in the field, this text shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. The book includes many examples, figures, exercises, and projects and provides PowerPoint slides and other ancillaries on the author's website. A solutions manual is available with qualifying course adoption.
Security without obscurity : a guide to cryptographic architectures
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher.
Convergence
by
Center for Complex Operations (U.S. Army, NDU)
,
(U.S.), National Defense University
,
(U.S.), Institute for National Strategic Studies
in
Computer security
,
Security measures
,
Social networks
2013
The Center for Complex Operations (CCO) has produced this edited volume, Convergence: Illicit Networks and National Security in the Age of Globalization, that delves deeply into everything mentioned above and more. In a time when the threat is growing, this is a timely effort. CCO has gathered an impressive cadre of authors to illuminate the important aspects of transnational crime and other illicit networks. They describe the clear and present danger and the magnitude of the challenge of converging and connecting illicit networks; the ways and means used by transnational criminal networks and how illicit networks actually operate and interact; how the proliferation, convergence, and horizontal diversification of illicit networks challenge state sovereignty; and how different national and international organizations are fighting back. A deeper understanding of the problem will allow us to then develop a more comprehensive, more effective, and more enduring solution. Other related products: YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer can be found here: https://bookstore.gpo.gov/products/sku/008-000-01071-4 Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications can be found here: https://bookstore.gpo.gov/products/sku/008-000-01128-1 Confidence Building in Cyberspace: A Comparison of Territorial and Weapons-Based Regimes can be found here: https://bookstore.gpo.gov/products/sku/008-000-01139-7 Army Support of Military Cyberspace Operations: Joint Contexts and Global Escalation Implications can be found here: https://bookstore.gpo.gov/products/sku/008-000-01094-3 Legality in Cyberspace: An Adversary View can be found here: https://bookstore.gpo.gov/products/sku/008-000-01108-7 Cyberterrorism After Stuxnet can be found here:
https://bookstore.gpo.gov/products/sku/008-000-01117-6 Fundamentals of War Gaming --Print Paperback format can be found here: https://bookstore.gpo.gov/products/sku/008-046-00299-1 -- Print Hardcover format can be found here: https://bookstore.gpo.gov/products/sku/008-046-00269-0 Policy Analysis in National Security Affairs: New Methods for a New Era can be found here: https://bookstore.gpo.gov/products/sku/008-020-01561-0 Economic Security: Neglected Dimension of National Security --print paperback format can be found here: https://bookstore.gpo.gov/products/sku/008-020-01617-9 --ePub format can be found here: https://bookstore.gpo.gov/products/sku/999-000-44440-9 Other products produced by the U.S. Army, National Defense University can be found here: https://bookstore.gpo.gov/agency/1078 Other products produced by the U.S. Army War College, Strategic Studies Institute can be found here: https://bookstore.gpo.gov/agency/1609.
A cryptography primer : secrets and promises
\"Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure\"-- Provided by publisher.
Secure Communicating Systems
by
Huth, Michael R. A.
in
Security measures
,
Telecommunication
,
Telecommunication -- Security measures
2001
More and more working computer professionals are confronted with the use, maintenance, or customization of cryptographic components and program certification mechanisms for local or mobile code. This text for advanced undergraduate and beginning graduate students tells what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include a detailed description of the new advanced encryption standard Rijndael; a complete description of an optimal public-key encryption using RSA which turns 'textbook RSA' into a practical implementation; a current, and formal discussion of standard security models for information flow in computer programs or human organizations; and a discussion of moral, legal, and political issues. Another novel feature of the book is the presentation of a formal model-checking tool for specifying and debugging security protocols. The book also includes numerous implementation exercises and programming projects. A supporting web site contains Java source code for the programs featured in the text plus links to other sites, including online papers and tutorials offering deeper treatments of the topics presented.
Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
by
ACNS 2005 (2005 : New York, N.Y.)
,
Ioannidis, John editor
,
Keromytis, Angelos editor
in
Telecommunication Security measures Congresses.
,
Data encryption (Computer science) Congresses.
,
Cryptography Congresses.
2005
Chaotic Secure Communication
by
Tsinghua University Press, Tsinghua University
,
Sun, Kehui
in
COM053000 COMPUTERS / Security / General
,
Computer security
,
COMPUTERS / General
2016
The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.