rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780849371790

Computer System and Network Security

by ;
  • ISBN13:

    9780849371790

  • ISBN10:

    0849371791

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 1995-08-10
  • Publisher: CRC Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $175.00 Save up to $56.87
  • Rent Book $118.13
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Computer System and Network Security [ISBN: 9780849371790] for the semester, quarter, and short term or search our site for other textbooks by White; Gregory B.. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference.Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails.This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature.

Table of Contents

(Note: Most chapters include a summary, exercises, references, and an extended bibliography)
Computer Security Fundamentals
Objectives of Computer Security
Issues Involved in Computer Security
Privacy and Ethics
Risk Analysis
Theory
Possible Loss (L)
Probability of Loss Occurrence (P)
Burden of Preventing Loss (B)
Applying the Risk Analysis Equation
Risk Analysis in Computer Security
Terminology
Application
Developing Secure Computer Systems
External Security Measures
Structure of a Computer System
Secure Computer System Issues
Security Models
Specification and Verification
Security Models
Bell and LaPadula
Clark-Wilson
Goguen-Meseguer
TCSEC
Discretionary Access Requirements
Mandatory Access Requirements
User Authentication
Authentication Objectives
Authentication Methods
Informational Keys
Physical Keys
Biometric Keys
Access and Information Flow Controls
File Passwords
Capabilities Based
Access Control Lists
Protection Bits
Controls for Mandatory Access
Trojan Horses
AUDITING and INTRUSION DETECTION
Audit Trail Features
Intrusion Detection Systems
User Profiling
Intruder Profiling
Signature Analysis
Action Based
IDES
MIDAS
Haystack
Network Intrusion Detection
Network Attack Characteristics
NSM
DIDS
NADIR
CSM
Monitoring and the Law
Damage Control and Assessment
Damage Control
Inform the Authorities
Backup System Data
Remove the Intruder
Contain and Monitor the Intruder
Lock Stolen Accounts
Require Additional Authentication
Damage Assessment
Attack Recovery
Damage Prevention
Network Security
Network Fundamentals
Network Security Issues
Basic Network Security Objectives and Threats
Security Services
The Trusted Network Interpretation
TNI Security Service
AIS Interconnection Issues
Distributed Systems Security
Firewalls
Simple Damage Limiting Approaches
Network Firewalls
Packet Filtering Gateways
Circuit Level Gateways
Application Level Gateways
Firewall Costs and Effectiveness
Database Security
Database Management System Primer
DBMS Vulnerabilities and Responses
Inference
Aggregation
Data Integrity
Trojan Horses
Cryptography
Substitution Ciphers
Caesar Cipher
ROT13
Substitution Cipher Variations
Vigenere Ciphers
One Time Pads
Transposition Ciphers
Encrypting Digital Communication
DES
IDEA
Key Escrow
Public Key Cryptography
Digital Signatures
Malicious Software
Viruses
Worms
Trojan Horses
Time Bombs
Security Standards
The Federal Criteria
The Common Criteria
The Trusted Computer System Evaluation Criteria
The Information Technology Security Evaluation Criteria
Case Study
The Hannover Hackers
An Evening With Berferd
The Internet Worm
Appendix: Information Warfare

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program