Buy Computer Security Book by Lawrie Brown - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Computer Security: Principles and Practice (2-Downloads)
Computer Security: Principles and Practice (2-Downloads)

Computer Security: Principles and Practice (2-Downloads)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists.   In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.  In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.    It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.   The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.   Teaching and Learning Experience This program presents a better teaching and learning experience—for you and your students. It will help: Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective.  Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security. Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material. Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.

Table of Contents:
Contents         Online Resources Preface Notation About the Authors Chapter 0        Guide for Readers and Instructors          0.1         Outline of This Book          0.2         A Roadmap for Readers and Instructors          0.3         Support for CISSP Certification          0.4         Support for NSA/DHS Certification          0.5         Support for ACM/IEEE Computer Science Curricula 2013          0.6         Internet and Web Resources          0.7         Standards   Chapter 1        Overview          1.1         Computer Security Concepts          1.2         Threats, Attacks, and Assets          1.3         Security Functional Requirements          1.4         Fundamental Security Design Principles          1.5         Attack Surfaces and Attack Trees          1.6         Computer Security Strategy          1.7         Recommended Reading          1.8         Key Terms, Review Questions, and Problems   PART ONE  COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2        Cryptographic Tools          2.1         Confidentiality with Symmetric Encryption          2.2         Message Authentication and Hash Functions          2.3         Public-Key Encryption          2.4         Digital Signatures and Key Management          2.5         Random and Pseudorandom Numbers          2.6         Practical Application: Encryption of Stored Data          2.7         Recommended Reading          2.8         Key Terms, Review Questions, and Problems   Chapter 3        User Authentication          3.1         Electronic User Authentication Principles          3.2         Password-Based Authentication          3.3         Token-Based Authentication          3.4         Biometric Authentication          3.5         Remote User Authentication          3.6         Security Issues for User Authentication          3.7         Practical Application: An Iris Biometric System          3.8         Case Study: Security Problems for ATM Systems          3.9         Recommended Reading          3.10         Key Terms, Review Questions, and Problems   Chapter 4        Access Control          4.1         Access Control Principles          4.2         Subjects, Objects, and Access Rights          4.3         Discretionary Access Control          4.4         Example: UNIX File Access Control          4.5         Role-Based Access Control          4.6         Attribute-Based Access Control          4.7         Identity, Credential, and Access Management          4.8         Trust Frameworks          4.9         Case Study: RBAC System for a Bank          4.10         Recommended Reading          4.11         Key Terms, Review Questions, and Problems   Chapter 5        Database and Cloud Security          5.1         The Need for Database Security          5.2         Database Management Systems          5.3         Relational Databases          5.4         SQL Injection Attacks          5.5         Database Access Control          5.6         Inference          5.7         Database Encryption          5.8         Cloud Computing          5.9         Cloud Security Risks and Countermeasures          5.10         Data Protection in the Cloud          5.11         Cloud Security as a Service          5.12         Recommended Reading          5.13         Key Terms, Review Questions, and Problems   Chapter 6        Malicious Software          6.1         Types of Malicious Software          6.2         Advanced Persistent Threat          6.2         Propagation – Infected Content - Viruses          6.3         Propagation – Vulnerability Exploit - Worms          6.4         Propagation – Social Engineering – SPAM E-Mail, Trojans          6.5         Payload – System Corruption          6.6         Payload – Attack Agent – Zombie, Bots          6.7         Payload – Information Theft – Keyloggers, Phishing, Spyware          6.8         Payload – Stealthing – Backdoors, Rootkits          6.9         Countermeasures          6.10         Recommended Reading          6.11         Key Terms, Review Questions, and Problems   Chapter 7        Denial-of-Service Attacks          7.1         Denial-of-Service Attacks          7.2         Flooding Attacks          7.3         Distributed Denial-of-Service Attacks          7.4         Application-Based Bandwidth Attacks          7.5         Reflector and Amplifier Attacks          7.6         Defenses Against Denial-of-Service Attacks          7.7         Responding to a Denial-of-Service Attack          7.8         Recommended Reading          7.9         Key Terms, Review Questions, and Problems   Chapter 8        Intrusion Detection          8.1         Intruders          8.2         Intrusion Detection          8.3         Analysis Approaches          8.4         Host-Based Intrusion Detection          8.5         Network-Based Intrusion Detection          8.6         Distributed or Hybrid Intrusion Detection          8.7         Intrusion Detection Exchange Format          8.8         Honeypots          8.9         Example System: Snort          8.10         Recommended Reading          8.11         Key Terms, Review Questions, and Problems   Chapter 9        Firewalls and Intrusion Prevention Systems          9.1         The Need for Firewalls          9.2         Firewall Characteristics and Access Policy          9.3         Types of Firewalls          9.4         Firewall Basing          9.5         Firewall Location and Configurations          9.6         Intrusion Prevention Systems          9.7         Example: Unified Threat Management Products          9.8         Recommended Reading          9.9         Key Terms, Review Questions, and Problems   PART TWO         SOFTWARE SECURITY AND TRUSTED SYSTEMS Chapter 10        Buffer Overflow          10.1         Stack Overflows          10.2         Defending Against Buffer Overflows          10.3         Other Forms of Overflow Attacks          10.4         Recommended Reading          10.5         Key Terms, Review Questions, and Problems   Chapter 11        Software Security          11.1         Software Security Issues          11.2         Handling Program Input          11.3         Writing Safe Program Code          11.4         Interacting with the Operating System and Other Programs          11.5         Handling Program Input          11.6         Recommended Reading          11.7         Key Terms, Review Questions, and Problems   Chapter 12        Operating System Security          12.1         Introduction to Operating System Security          12.3         System Security Planning          12.3         Operating Systems Hardening          12.4         Application Security          12.5         Security Maintenance          12.6         Linux/UNIX Security          12.7         Windows Security          12.8         Virtualization Security          12.9         Recommended Reading          12.10         Key Terms, Review Questions, and Problems   Chapter 13        Trusted Computing and Multilevel Security          13.1         The Bell-LaPadula Model for Computer Security          13.2         Other Formal Models for Computer Security          13.3         The Concept of Trusted Systems          13.4         Application of Multilevel Security          13.5         Trusted Computing and the Trusted Platform Module          13.6         Common Criteria for Information Technology Security Evaluation          13.7         Assurance and Evaluation          13.8         Recommended Reading          13.9         Key Terms, Review Questions, and Problems   PART THREE         MANAGEMENT ISSUES Chapter 14        IT Security Management and Risk Assessment          14.1         IT Security Management          14.2         Organizational Context and Security Policy          14.3         Security Risk Assessment          14.4         Detailed Security Risk Analysis          14.5         Case Study: Silver Star Mines          14.6         Recommended Reading          14.7         Key Terms, Review Questions, and Problems   Chapter 15        IT Security Controls, Plans and Procedures          15.1         IT Security Management Implementation          15.2         Security Controls or Safeguards          15.3         IT Security Plan          15.4         Implementation of Controls          15.5         Monitoring Risks          15.6         Case Study: Silver Star Mines          15.7         Recommended Reading          15.8         Key Terms, Review Questions, and Problems   Chapter 16        Physical and Infrastructure Security          16.1         Overview          16.2         Physical Security Threats          16.3         Physical Security Prevention and Mitigation Measures          16.4         Recovery from Physical Security Breaches          16.5         Example: A Corporate Physical Security Policy          16.6         Integration of Physical and Logical Security          16.7         Recommended Reading          16.8         Key Terms, Review Questions, and Problems   Chapter 17        Human Resources Security          17.1         Security Awareness, Training, and Education          17.2         Employment Practices and Policies          17.3         E-Mail and Internet Use Policies          17.4         Computer Security Incident Response Teams          17.5         Recommended Reading          17.6         Key Terms, Review Questions, and Problems   Chapter 18        Security Auditing          18.1         Security Auditing Architecture          18.2         The Security Audit Trail          18.3         Implementing the Logging Function          18.4         Audit Trail Analysis          18.5         Example: An Integrated Approach          18.6         Recommended Reading          18.7         Key Terms, Review Questions, and Problems   Chapter 19        Legal and Ethical Aspects          19.1         Cybercrime and Computer Crime          19.2         Intellectual Property          19.3         Privacy          19.4         Ethical Issues          19.5         Recommended Reading          19.6         Key Terms, Review Questions, and Problems          Appendix 19A: Information Privacy Standard of Good Practice   PART FOUR  CRYPTOGRAPHIC ALGORITHMS Chapter 20        Symmetric Encryption and Message Confidentiality          20.1         Symmetric Encryption and Message Confidentiality          20.2         Data Encryption Standard          20.3         Advanced Encryption Standard          20.4         Stream Ciphers and RC4          20.5         Cipher Block Modes of Operation          20.6         Location of Symmetric Encryption Devices          20.7         Key Distribution          20.8         Recommended Reading          20.9         Key Terms, Review Questions, and Problems   Chapter 21        Public-Key Cryptography and Message Authentication          21.1         Secure Hash Functions          21.2         HMAC          21.3         The RSA Public-Key Encryption Algorithm          21.4         Diffie-Hellman and Other Asymmetric Algorithms          21.5         Recommended Reading          21.6         Key Terms, Review Questions, and Problems   PART FIVE         NETWORK SECURITY Chapter 22        Internet Security Protocols and Standards          22.1         Secure Email and S/MIME          22.2         DomainKeys Identified Mail          22.3         Secure Sockets Layer (SSL) and Transport Layer Security (TLS)          22.4         HTTPS          22.5         IPv4 and IPv6 Security          22.6         Recommended Reading          22.7         Key Terms, Review Questions, and Problems   Chapter 23        Internet Authentication Applications          23.1         Kerberos          23.2         X.509          23.3         Public-Key Infrastructure          23.4         Federated Identity Management          23.5         Recommended Reading          23.6         Key Terms, Review Questions, and Problems   Chapter 24        Wireless Network Security          24.1         Wireless Security Overview          24.2         Mobile Device Security          24.3         IEEE 802.11 Wireless LAN Overview          24.4         IEEE 802.11i Wireless LAN Security          24.5         Recommended Reading          24.6         Key Terms, Review Questions, and Problems   APPENDICES Appendix  A  Projects and Other Student Exercises for Teaching Computer Security          A.1         Hacking Project          A.2         Laboratory Exercises          A.3         Security Education (SEED) Projects          A.4         Research Projects          A.5         Programming Projects          A.6         Practical Security Assessments          A.7         Firewall Projects          A.8         Case Studies          A.9         Reading/Report Assignments          A.10       Writing Assignments          A.11       Webcasts for Teaching Computer Security   REFERENCES INDEX LIST OF ACRONYMS   ONLINE CHAPTERS AND APPENDICES Online chapters, appendices, and other documents are Premium Content, available via the access card printed in the front of the book.   Chapter 25        Linux Security          25.1         Introduction          25.2         Linux's Security Model          25.3         The Linux DAC in Depth: Filesystem Security          25.4         Linux Vulnerabilities          25.5         Linux System Hardening          25.6         Application Security          25.7         Mandatory Access Controls          25.8         Recommended Reading          25.9         Key Terms, Review Questions, and Problems   Chapter 26        Windows and Windows Vista Security          26.1         Windows Security Architecture          26.2         Windows Vulnerabilities          26.3         Windows Security Defenses          26.4         Browser Defenses          26.5         Cryptographic Services          26.6         Common Criteria          26.7         Recommended Reading          26.8         Key Terms, Review Questions, Problems, and Projects   Appendix B Some Aspects of Number Theory Appendix C Standards and Standard-Setting Organizations Appendix D Random and Pseudorandom Number Generation Appendix E Message Authentication Codes Based on Block Ciphers Appendix F TCP/IP Protocol Architecture Appendix G Radix-64 Conversion Appendix H Security Policy-Related Documents Appendix I The Domain Name System Appendix J The Base-Rate Fallacy Appendix K SHA-3 Appendix L Glossary  

About the Author :
Dr. William Stallings has authored 17 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients include computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He has nine times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia , a scholarly journal devoted to all aspects of cryptology. Dr. Lawrie Brown is a senior lecturer in the School of Information Technology and Electrical Engineering, at the Australian Defence Force Academy (UNSW@ADFA) in Canberra, Australia. His professional interests include cryptography, communications and computer systems security, and most recently, the design of safe mobile code environments using the functional language Erlang. He has previously worked on the design and implementation of private key block ciphers, in particular the LOKI family of encryption algorithms. He currently teaches courses in computer security, cryptography, data communications and java programming, and conducts workshops in security risk assessment and firewall design.


Best Sellers


Product Details
  • ISBN-13: 9780133774399
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Language: English
  • Sub Title: Principles and Practice (2-Downloads)
  • ISBN-10: 0133774392
  • Publisher Date: 30 Jun 2014
  • Binding: Digital download
  • No of Pages: 9998
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Computer Security: Principles and Practice (2-Downloads)
Pearson Education (US) -
Computer Security: Principles and Practice (2-Downloads)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Computer Security: Principles and Practice (2-Downloads)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!