rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780471978442

Computer Security

by
  • ISBN13:

    9780471978442

  • ISBN10:

    0471978442

  • Format: Paperback
  • Copyright: 1999-01-01
  • Publisher: WILEY
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $70.00

Summary

This is a brand new edition of the best-selling computer security book. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems. Comprehensive reference covering fundamental principles of computer security Thinking about security within the initial design of a system is a theme that runs through the book A top-down approach. No active previous experience of security issues is necessary making this accessible to Software Developers and Managers whose responsibilities span any technical aspects of IT security Provides sections on Windows NT, CORBA and Java

Table of Contents

Preface xiii
PART ONE FUNDAMENTALS 1(80)
1 Setting the Scene
3(16)
1.1 Definitions
3(6)
1.2 The Fundamental Dilemma of Computer Security
9(1)
1.3 Data vs Information
10(1)
1.4 Principles of Computer Security
11(4)
1.5 The Layer Below
15(2)
Further Reading
17(1)
Exercises
17(2)
2 Identification and Authentication
19(11)
2.1 Username and Password
19(1)
2.2 Choosing Passwords
20(2)
2.3 Spoofing Attacks
22(2)
2.4 Protecting the Password File
24(1)
2.5 Single Sign-on
25(1)
2.6 Alternative Approaches
26(2)
Further Reading
28(1)
Exercises
28(2)
3 Access Control
30(16)
3.1 Background
30(1)
3.2 Subjects and Objects
31(1)
3.3 Access Operations
31(3)
3.4 Ownership
34(1)
3.5 Access Control Structures
35(2)
3.6 Intermediate Controls
37(4)
3.7 The Lattice of Security Levels
41(3)
Further Reading
44(1)
Exercises
44(2)
4 Security Models
46(15)
4.1 State Machine Models
46(1)
4.2 The Bell-LaPadula Model
47(4)
4.3 The Harrison-Ruzzo-Ullman Model
51(2)
4.4 The Chinese Wall Model
53(2)
4.5 The Biba Model
55(1)
4.6 The Clark-Wilson Model
56(2)
4.7 Information-Flow Models
58(1)
Further Reading
59(1)
Exercises
60(1)
5 The Security Kernel
61(20)
5.1 Rationale
61(1)
5.2 Operating System Integrity
62(2)
5.3 Hardware Security Features
64(7)
5.4 Reference Monitor
71(7)
Further Reading
78(1)
Exercises
79(2)
PART TWO PRACTICE 81(82)
6 Unix Security
83(20)
6.1 Introduction
83(2)
6.2 Unix Security Architecture
85(1)
6.3 Login and User Accounts
85(3)
6.4 Access Control
88(5)
6.5 Instances of General Security Principles
93(4)
6.6 Audit Logs and Intrusion Detection
97(2)
6.7 Wrappers
99(1)
6.8 Installation and Configuration
100(1)
Further Reading
101(1)
Exercises
102(1)
7 Windows NT Security
103(19)
7.1 Introduction
103(1)
7.2 The Registry
104(3)
7.3 Identification and Authentication
107(2)
7.4 Access Control -- Features
109(5)
7.5 Access Control -- Management
114(5)
7.6 Audit
119(1)
7.7 Security Aspects of DLLs
119(1)
Further Reading
120(1)
Exercises
121(1)
8 How Things Go Wrong
122(22)
8.1 Introduction
122(1)
8.2 Change in Environment
123(1)
8.3 Bound and Syntax Checking
124(3)
8.4 Convenient Features
127(1)
8.5 Controlled Invocation
127(1)
8.6 Bypass
128(3)
8.7 Flawed Protocol Implementations
131(3)
8.8 Virus Attacks
134(6)
8.9 Anti-Virus Software
140(2)
Further Reading
142(1)
Exercises
143(1)
9 Security Evaluation
144(19)
9.1 Introduction
144(3)
9.2 The Orange Book
147(4)
9.3 TNI -- The Trusted Network Interpretation
151(4)
9.4 Information Technology Security Evaluation Criteria
155(3)
9.5 The Common Criteria
158(2)
9.6 Quality Standards
160(1)
9.7 Effort Well Spent?
160(1)
Further Reading
161(1)
Exercises
161(2)
PART THREE DISTRIBUTED SYSTEMS 163(82)
10 Distributed Systems Security
165(21)
10.1 Introduction
165(3)
10.2 Authentication
168(6)
10.3 Security APIs
174(5)
10.4 CORBA Security
179(5)
Further Reading
184(1)
Exercises
184(2)
11 World Wide Web Security
186(14)
11.1 Background
186(2)
11.2 Web Browsers
188(1)
11.3 CGI Scripts
189(2)
11.4 Cookies
191(1)
11.5 Certified Code
192(1)
11.6 The Sandbox
193(3)
11.7 Intellectual Property Protection
196(2)
Further Reading
198(1)
Exercises
199(1)
12 Cryptography
200(24)
12.1 Introduction
200(4)
12.2 Cryptographic Mechanisms
204(13)
12.3 Key Establishment Protocols
217(2)
12.4 Certificates
219(1)
12.5 Strength of Mechanisms
220(2)
Further Reading
222(1)
Exercises
222(2)
13 Network Security
224(21)
13.1 Introduction
224(4)
13.2 TCP/IP Security
228(8)
13.3 Network Boundaries
236(1)
13.4 Firewalls
237(4)
Further Reading
241(1)
Exercises
242(3)
PART FOUR THEORY 245(62)
14 Database Security
247(19)
14.1 Introduction
247(2)
14.2 Relational Databases
249(4)
14.3 Access Control
253(5)
14.4 Statistical Database Security
258(5)
14.5 Integration with the Operating System
263(1)
Further Reading
263(1)
Exercises
264(2)
15 Multi-Level Secure Databases
266(13)
15.1 Rationale
266(1)
15.2 MAC in a Relational Database
267(4)
15.3 Polyinstantiation
271(2)
15.4 Insert Low
273(2)
15.5 Implementation Issues
275(2)
Further Reading
277(1)
Exercises
277(2)
16 Concurrency Control and Multi-Level Security
279(17)
16.1 Motivation
279(1)
16.2 Concurrency Control
280(5)
16.3 MLS Concurrency Control
285(6)
16.4 Non-serialisable Concurrency Control
291(3)
Further Reading
294(1)
Exercises
295(1)
17 Object-Oriented Security
296(11)
17.1 Rationale
296(1)
17.2 The Object Model
297(1)
17.3 Security in the Object Model
298(1)
17.4 MAC in Object-Oriented Systems
299(6)
Further Reading
305(1)
Exercises
305(2)
Bibliography 307(8)
Index 315

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program