Computer Security : Principles and Practice

by ;
  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2008-01-01
  • Publisher: Prentice Hall
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $127.00


In recent years, the need for education in computer security and related topics has grown dramatically and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

Table of Contents

Reader's and Instructor's Guide
Outline of the Book
A Roadmap for Readers and Instructors
Internet and Web Resources
Computer Security Concepts
Threats, Attacks, and Assets
Security Functional Requirements
A Security Architecture for Open Systems
The Scope of Computer Security
Computer Security Trends
Computer Security Strategy
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
A Signficant Security Standards and Documents
Computer Security Technology and Principles
Cryptographic Tools
Confidentiality with Symmetric Encryption
Message Authentication and Hash Functions
Public-Key Encryption
Digital Signatures and Key Management
Random and Pseudorandom Numbers
Practical Application: Encryption of Stored Data
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
User Authentication
Means of Authentication
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
Remote User Authentication
Security Issues for User Authentication
Practical Application: An Iris Biometric System
Case Study: Security Problems for ATM Systems
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Access Control
Access Control Principles
Subjects, Objects, and Access Rights
Discretionary Access Control
Example: UNIX File Access Control
Role-Based Access Control
Case Study: RBAC System for a Bank
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Database Security
Relational Databases
Database Access Control
Statistical Databases
Database Encryption
Recommended Reading
Key Terms, Review Questions, and Problems
Intrusion Detection
Intrusion Detection
Host-Based Intrusion Detection
Table of Contents provided by Publisher. All Rights Reserved.

Rewards Program

Write a Review