Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Computer System and Network Security [ISBN: 9780849371790] for the semester, quarter, and short term or search our site for other textbooks by White; Gregory B.. Renting a textbook can save you up to 90% from the cost of buying.
(Note: Most chapters include a summary, exercises, references, and an extended bibliography) | |
Computer Security Fundamentals | |
Objectives of Computer Security | |
Issues Involved in Computer Security | |
Privacy and Ethics | |
Risk Analysis | |
Theory | |
Possible Loss (L) | |
Probability of Loss Occurrence (P) | |
Burden of Preventing Loss (B) | |
Applying the Risk Analysis Equation | |
Risk Analysis in Computer Security | |
Terminology | |
Application | |
Developing Secure Computer Systems | |
External Security Measures | |
Structure of a Computer System | |
Secure Computer System Issues | |
Security Models | |
Specification and Verification | |
Security Models | |
Bell and LaPadula | |
Clark-Wilson | |
Goguen-Meseguer | |
TCSEC | |
Discretionary Access Requirements | |
Mandatory Access Requirements | |
User Authentication | |
Authentication Objectives | |
Authentication Methods | |
Informational Keys | |
Physical Keys | |
Biometric Keys | |
Access and Information Flow Controls | |
File Passwords | |
Capabilities Based | |
Access Control Lists | |
Protection Bits | |
Controls for Mandatory Access | |
Trojan Horses | |
AUDITING and INTRUSION DETECTION | |
Audit Trail Features | |
Intrusion Detection Systems | |
User Profiling | |
Intruder Profiling | |
Signature Analysis | |
Action Based | |
IDES | |
MIDAS | |
Haystack | |
Network Intrusion Detection | |
Network Attack Characteristics | |
NSM | |
DIDS | |
NADIR | |
CSM | |
Monitoring and the Law | |
Damage Control and Assessment | |
Damage Control | |
Inform the Authorities | |
Backup System Data | |
Remove the Intruder | |
Contain and Monitor the Intruder | |
Lock Stolen Accounts | |
Require Additional Authentication | |
Damage Assessment | |
Attack Recovery | |
Damage Prevention | |
Network Security | |
Network Fundamentals | |
Network Security Issues | |
Basic Network Security Objectives and Threats | |
Security Services | |
The Trusted Network Interpretation | |
TNI Security Service | |
AIS Interconnection Issues | |
Distributed Systems Security | |
Firewalls | |
Simple Damage Limiting Approaches | |
Network Firewalls | |
Packet Filtering Gateways | |
Circuit Level Gateways | |
Application Level Gateways | |
Firewall Costs and Effectiveness | |
Database Security | |
Database Management System Primer | |
DBMS Vulnerabilities and Responses | |
Inference | |
Aggregation | |
Data Integrity | |
Trojan Horses | |
Cryptography | |
Substitution Ciphers | |
Caesar Cipher | |
ROT13 | |
Substitution Cipher Variations | |
Vigenere Ciphers | |
One Time Pads | |
Transposition Ciphers | |
Encrypting Digital Communication | |
DES | |
IDEA | |
Key Escrow | |
Public Key Cryptography | |
Digital Signatures | |
Malicious Software | |
Viruses | |
Worms | |
Trojan Horses | |
Time Bombs | |
Security Standards | |
The Federal Criteria | |
The Common Criteria | |
The Trusted Computer System Evaluation Criteria | |
The Information Technology Security Evaluation Criteria | |
Case Study | |
The Hannover Hackers | |
An Evening With Berferd | |
The Internet Worm | |
Appendix: Information Warfare |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.