Adobe PDF (7.42 MB)
Table of Contents - Adobe PDF (128.29 kB)
EPUB (11.38 MB)
Download
Brochure
Download
User comments
Similar Books
Title Details:
Information and Security Systems Laboratory
Authors: Mavridis, Ioannis
Reviewer: Fouliras, Panagiotis
Subject: MATHEMATICS AND COMPUTER SCIENCE >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > > >
MATHEMATICS AND COMPUTER SCIENCE > >
Keywords:
Information Security
Security Models
Operating Systems
Database Security
Security Policies
Audit Policy
Authentication
Passwords
Access Control
Malware
Risk Analysis
Description:
Abstract:
Interactive (hands-on or demonstration type) laboratory exercises designed to enable the reader to apply the knowledge acquired during the study of the main text for the Information and Systems Security course. The student will be able to: (a) be assisted in the practical application of the fundamental concepts and issues of information and systems security; (b) see in practice the application of what he/she has assimilated by studying the relevant theoretical background, such as security policies and models; (c) gain knowledge and experience on the basic protection techniques and new directions in the development of secure information systems. In addition to the first chapter, which deals with the appropriate preparation for the workshop, twelve (12) chapters are listed, one for each laboratory course.
Technical Editors: Salonikias, Stavros
Tsinganos, Nikolaos
Type: Laboratory Guide
Creation Date: 2015
Item Details:
ISBN 978-960-603-192-2
License: Attribution – NonCommercial – NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
DOI http://dx.doi.org/10.57713/kallipos-910
Handle http://hdl.handle.net/11419/525
Bibliographic Reference: Mavridis, I. (2015). Information and Security Systems Laboratory [Laboratory Guide]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-910
Language: Greek
Consists of:
1. Laboratory Prpeparation
2. Authentication and Indetification
3. Password Management and Attacks
4. Recording and Monitoring User Actions
5. Access Control to Operating Systems
6. Database Integrity Constraints
7. Access Control in Database Management Systems
8. Role - based access control
9. Static malware analysis
10. Dynamic malware analysis
11. Risk Analysis and Management
12. Common Criteria Security Assessment
13. Access Control with Firewall
Number of pages 213
Publication Origin: Kallipos, Open Academic Editions
You can also view
User comments
There are no published comments available!