Computer Security
Home > Computing and Information Technology > Computer security > Computer Security: Principles and Practice
Computer Security: Principles and Practice

Computer Security: Principles and Practice

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

For courses in computer/network security Balancing principle and practice–an updated survey of the fast-moving world of computer and network security Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate–and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the ‘gold standard’ when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.

Table of Contents:
Table of Contents Online Resources Preface Notation About the Authors Chapter 1 Overview 1.1 Computer Security Concepts 1.2 Threats, Attacks, and Assets 1.3 Security Functional Requirements 1.4 Fundamental Security Design Principles 1.5 Attack Surfaces and Attack Trees 1.6 Computer Security Strategy 1.7 Standards 1.8 Key Terms, Review Questions, and Problems PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools 2.1 Confidentiality with Symmetric Encryption 2.2 Message Authentication and Hash Functions 2.3 Public-Key Encryption 2.4 Digital Signatures and Key Management 2.5 Random and Pseudorandom Numbers 2.6 Practical Application: Encryption of Stored Data 2.7 Key Terms, Review Questions, and Problems Chapter 3 User Authentication 3.1 Digital User Authentication Principles 3.2 Password-Based Authentication 3.3 Token-Based Authentication 3.4 Biometric Authentication 3.5 Remote User Authentication 3.6 Security Issues for User Authentication 3.7 Practical Application: An Iris Biometric System 3.8 Case Study: Security Problems for ATM Systems 3.9 Key Terms, Review Questions, and Problems Chapter 4 Access Control 4.1 Access Control Principles 4.2 Subjects, Objects, and Access Rights 4.3 Discretionary Access Control 4.4 Example: UNIX File Access Control 4.5 Role-Based Access Control 4.6 Attribute-Based Access Control 4.7 Identity, Credential, and Access Management 4.8 Trust Frameworks 4.9 Case Study: RBAC System for a Bank 4.10 Key Terms, Review Questions, and Problems Chapter 5 Database and Data Center Security 5.1 The Need for Database Security 5.2 Database Management Systems 5.3 Relational Databases 5.4 SQL Injection Attacks 5.5 Database Access Control 5.6 Inference 5.7 Database Encryption 5.8 Data Center Security 5.9 Key Terms, Review Questions, and Problems Chapter 6 Malicious Software 6.1 Types of Malicious Software 6.2 Advanced Persistent Threat 6.2 Propagation — Infected Content - Viruses 6.3 Propagation — Vulnerability Exploit - Worms 6.4 Propagation — Social Engineering — SPAM E-Mail, Trojans 6.5 Payload — System Corruption 6.6 Payload — Attack Agent — Zombie, Bots 6.7 Payload — Information Theft — Keyloggers, Phishing, Spyware 6.8 Payload — Stealthing — Backdoors, Rootkits 6.9 Countermeasures 6.10 Key Terms, Review Questions, and Problems Chapter 7 Denial-of-Service Attacks 7.1 Denial-of-Service Attacks 7.2 Flooding Attacks 7.3 Distributed Denial-of-Service Attacks 7.4 Application-Based Bandwidth Attacks 7.5 Reflector and Amplifier Attacks 7.6 Defenses Against Denial-of-Service Attacks 7.7 Responding to a Denial-of-Service Attack 7.8 Key Terms, Review Questions, and Problems Chapter 8 Intrusion Detection 8.1 Intruders 8.2 Intrusion Detection 8.3 Analysis Approaches 8.4 Host-Based Intrusion Detection 8.5 Network-Based Intrusion Detection 8.6 Distributed or Hybrid Intrusion Detection 8.7 Intrusion Detection Exchange Format 8.8 Honeypots 8.9 Example System: Snort 8.10 Key Terms, Review Questions, and Problems Chapter 9 Firewalls and Intrusion Prevention Systems 9.1 The Need for Firewalls 9.2 Firewall Characteristics and Access Policy 9.3 Types of Firewalls 9.4 Firewall Basing 9.5 Firewall Location and Configurations 9.6 Intrusion Prevention Systems 9.7 Example: Unified Threat Management Products 9.8 Key Terms, Review Questions, and Problems PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS Chapter 10 Buffer Overflow 10.1 Stack Overflows 10.2 Defending Against Buffer Overflows 10.3 Other Forms of Overflow Attacks 10.4 Key Terms, Review Questions, and Problems Chapter 11 Software Security 11.1 Software Security Issues 11.2 Handling Program Input 11.3 Writing Safe Program Code 11.4 Interacting with the Operating System and Other Programs 11.5 Handling Program Input 11.6 Key Terms, Review Questions, and Problems Chapter 12 Operating System Security 12.1 Introduction to Operating System Security 12.3 System Security Planning 12.3 Operating Systems Hardening 12.4 Application Security 12.5 Security Maintenance 12.6 Linux/UNIX Security 12.7 Windows Security 12.8 Virtualization Security 12.9 Key Terms, Review Questions, and Problems Chapter 13 Cloud and IoT Security 13.1 Cloud Computing 13.2 Cloud Security Concepts 13.3 Cloud Security Approaches 13.4 The Internet of Things 13.5 IoT Security 13.6 Key Terms, Review Questions, and Problems PART THREE MANAGEMENT ISSUES Chapter 14 IT Security Management and Risk Assessment 14.1 IT Security Management 14.2 Organizational Context and Security Policy 14.3 Security Risk Assessment 14.4 Detailed Security Risk Analysis 14.5 Case Study: Silver Star Mines 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 IT Security Controls, Plans and Procedures 15.1 IT Security Management Implementation 15.2 Security Controls or Safeguards 15.3 IT Security Plan 15.4 Implementation of Controls 15.5 Monitoring Risks 15.6 Case Study: Silver Star Mines 15.7 Key Terms, Review Questions, and Problems Chapter 16 Physical and Infrastructure Security 16.1 Overview 16.2 Physical Security Threats 16.3 Physical Security Prevention and Mitigation Measures 16.4 Recovery from Physical Security Breaches 16.5 Example: A Corporate Physical Security Policy 16.6 Integration of Physical and Logical Security 16.7 Key Terms, Review Questions, and Problems Chapter 17 Human Resources Security 17.1 Security Awareness, Training, and Education 17.2 Employment Practices and Policies 17.3 E-Mail and Internet Use Policies 17.4 Computer Security Incident Response Teams 17.5 Key Terms, Review Questions, and Problems Chapter 18 Security Auditing 18.1 Security Auditing Architecture 18.2 The Security Audit Trail 18.3 Implementing the Logging Function 18.4 Audit Trail Analysis 18.5 Security Information and Event Management 18.6 Key Terms, Review Questions, and Problems Chapter 19 Legal and Ethical Aspects 19.1 Cybercrime and Computer Crime 19.2 Intellectual Property 19.3 Privacy 19.4 Ethical Issues 19.5 Key Terms, Review Questions, and Problems Appendix 19A: Information Privacy Standard of Good Practice PART FOUR CRYPTOGRAPHIC ALGORITHMS Chapter 20 Symmetric Encryption and Message Confidentiality 20.1 Symmetric Encryption and Message Confidentiality 20.2 Data Encryption Standard 20.3 Advanced Encryption Standard 20.4 Stream Ciphers and RC4 20.5 Cipher Block Modes of Operation 20.6 Key Distribution 20.8 Key Terms, Review Questions, and Problems Chapter 21 Public-Key Cryptography and Message Authentication 21.1 Secure Hash Functions 21.2 HMAC 21.3 Authenticated Encryption 21.4 The RSA Public-Key Encryption Algorithm 21.5Diffie-Hellman and Other Asymmetric Algorithms 21.6 Key Terms, Review Questions, and Problems PART FIVE NETWORK SECURITY Chapter 22 Internet Security Protocols and Standards 22.1 Secure Email and S/MIME 22.2 DomainKeys Identified Mail 22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 22.4 HTTPS 22.5 IPv4 and IPv6 Security 22.6 Key Terms, Review Questions, and Problems Chapter 23 Internet Authentication Applications 23.1 Kerberos 23.2 X.509 23.3 Public-Key Infrastructure 23.4 Federated Identity Management 23.5 Key Terms, Review Questions, and Problems Chapter 24 Wireless Network Security 24.1 Wireless Security Overview 24.2 Mobile Device Security 24.3 IEEE 802.11 Wireless LAN Overview 24.4 IEEE 802.11i Wireless LAN Security 24.5 Key Terms, Review Questions, and Problems APPENDICES Appendix A Projects and Other Student Exercises for Teaching Computer Security A.1 Hacking Project A.2 Laboratory Exercises A.3 Security Education (SEED) Projects A.4 Research Projects A.5 Programming Projects A.6 Practical Security Assessments A.7 Firewall Projects A.8 Case Studies A.9 Reading/Report Assignments A.10 Writing Assignments A.11 Webcasts for Teaching Computer Security ACRONYMS LIST OF NIST DOCUMENTS REFERENCES INDEX ONLINE CHAPTERS AND APPENDICES Online chapters, appendices, and other documents are Premium Content, available via the access card printed in the front of the book. Chapter 25 Linux Security 25.1 Introduction 25.2 Linux's Security Model 25.3 The Linux DAC in Depth: Filesystem Security 25.4 Linux Vulnerabilities 25.5 Linux System Hardening 25.6 Application Security 25.7 Mandatory Access Controls 25.8 Key Terms, Review Questions, and Problems Chapter 26 Windows and Windows Vista Security 26.1 Windows Security Architecture 26.2 Windows Vulnerabilities 26.3 Windows Security Defenses 26.4 Browser Defenses 26.5 Cryptographic Services 26.6 Common Criteria 26.7 Key Terms, Review Questions, Problems, and Projects Appendix B Some Aspects of Number Theory Appendix C Standards and Standard-Setting Organizations Appendix D Random and Pseudorandom Number Generation Appendix E Message Authentication Codes Based on Block Ciphers Appendix F TCP/IP Protocol Architecture Appendix G Radix-64 Conversion Appendix H The Domain Name System Appendix I The Base-Rate Fallacy Appendix J SHA-3 Appendix K Glossary


Best Sellers


Product Details
  • ISBN-13: 9780134794105
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Sub Title: Principles and Practice
  • Width: 100 mm
  • ISBN-10: 0134794109
  • Height: 100 mm
  • No of Pages: 800
  • Spine Width: 100 mm
  • Weight: 100 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Computer Security: Principles and Practice
-
Computer Security: Principles and Practice
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Computer Security: Principles and Practice

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!