did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780136004240

Computer Security : Principles and Practice

by ;
  • ISBN13:

    9780136004240

  • ISBN10:

    0136004245

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2008-01-01
  • Publisher: Prentice Hall
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $127.00

Summary

In recent years, the need for education in computer security and related topics has grown dramatically and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

Table of Contents

Notation
Preface
Reader's and Instructor's Guide
Outline of the Book
A Roadmap for Readers and Instructors
Internet and Web Resources
Standards
Overview
Computer Security Concepts
Threats, Attacks, and Assets
Security Functional Requirements
A Security Architecture for Open Systems
The Scope of Computer Security
Computer Security Trends
Computer Security Strategy
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
A Signficant Security Standards and Documents
Computer Security Technology and Principles
Cryptographic Tools
Confidentiality with Symmetric Encryption
Message Authentication and Hash Functions
Public-Key Encryption
Digital Signatures and Key Management
Random and Pseudorandom Numbers
Practical Application: Encryption of Stored Data
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
User Authentication
Means of Authentication
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
Remote User Authentication
Security Issues for User Authentication
Practical Application: An Iris Biometric System
Case Study: Security Problems for ATM Systems
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Access Control
Access Control Principles
Subjects, Objects, and Access Rights
Discretionary Access Control
Example: UNIX File Access Control
Role-Based Access Control
Case Study: RBAC System for a Bank
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Database Security
Relational Databases
Database Access Control
Inference
Statistical Databases
Database Encryption
Recommended Reading
Key Terms, Review Questions, and Problems
Intrusion Detection
Intruders
Intrusion Detection
Host-Based Intrusion Detection
Distr
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program