Security in Computing

ISBN-10: 0130355488
ISBN-13: 9780130355485
Edition: 3rd 2003 (Revised)
List price: $104.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Appropriate for beginning to intermediate courses in computer security. This sweeping revision of the classic computer security book provides an authoritative overview of computer security for every type of system, from traditional centralized  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
History of Western Art Online content $4.95 $1.99
Add to cart
Study Briefs
History of World Philosophies Online content $4.95 $1.99
Add to cart
Study Briefs
American History Volume 1 Online content $4.95 $1.99
Add to cart
Study Briefs
History of Western Music Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $104.00
Edition: 3rd
Copyright year: 2003
Publisher: Prentice Hall PTR
Publication date: 12/2/2002
Binding: Hardcover
Pages: 746
Size: 7.25" wide x 9.25" long x 1.00" tall
Weight: 2.838
Language: English

Appropriate for beginning to intermediate courses in computer security. This sweeping revision of the classic computer security book provides an authoritative overview of computer security for every type of system, from traditional centralized systems to distributed networks and the Internet. The Third Edition has been updated to reflect the state-of-the-art in networking; cryptography; program and operating system security; administration; legal, privacy, and ethical issues, and much more. It combines core computer science concepts related to operating systems, networks, data bases, and programming, with accessible discussions of the use of cryptography and protocols. The book describes each important area from a developer's or user's point of view, lays out the security vulnerabilities and threats, and follows countermeasures to address them. Their book's layered approach is ideal for instructors who wish to customize courses based on their unique requirements. They also provide extensive pedagogical resources including overviews, end-of-chapter reviews, lists of key terms, and updated exercises and references. The authors are recognized experts in their fields. Lead author Dr. Charles P. Pfleeger, CISSP, is currently Master Security Architect for Cable & Wireless, one of the world's leading providers of Internet and secure infrastructure services. Co-author Dr. Shari Lawrence Pfleeger is a Senior Researcher at RAND Corporation, a not-for-profit company providing strategy and decision-making support in the public interest. They are the authors of more than a dozen previous books on computer security, software engineering, software measurement, software quality, and programming. Supplements including a solutions manual, PowerPoints and a companion website are available. In the "Resources" box above, please click on "Instructor."

Preface
Is There a Security Problem in Computing?
Characteristics of Computer Intrusion
Kinds of Security Breaches
Security Goals and Vulnerabilities
The People Involved
Methods of Defense
Plan of Attack
Bibliographic Notes
Terms and Concepts
Exercises
Basic Encryption and Decryption
Terminology and Background
Monoalphabetic Ciphers (Substitutions)
Polyalphabetic Substitution Ciphers
Transpositions (Permutations)
Fractionated Morse
Stream and Block Ciphers
Characteristics of Good Ciphers
What the Cryptanalyst Has to Work With
Summary of Basic Encryption
Bibliographic Notes
Terms and Concepts
Exercises
Secure Encryption Systems
Hard Problems: Complexity
Properties of Arithmetic
Public Key Encryption Systems
Merkle Hellman Knapsacks
Rivest Shamir Adelman (RSA) Encryption
El Gamal and Digital Signature Algorithms
Hash Algorithms
Secure Secret Key (Symmetric) Systems
The Data Encryption Standard (DES)
Key Escrow and Clipper
The Clipper Program
Conclusions
Summary of Secure Encryption
Bibliographic Notes
Terms and Concepts
Exercises
Using Encryption: Protocols and Practices
Protocols: Orderly Behavior
How to Use Encryption
Enhancing Cryptographic Security
Modes of Encryption
Summary of Protocols and Practices
Bibliographic Notes
Terms and Concepts
Exercises
Program Security
Viruses and Other Malicious Code
Targeted Malicious Code
Controls Against Program Threats
Summary of Program Threats and Controls
Bibliographic Notes
Terms and Concepts
Exercises
Protection in General-Purpose Operating Systems
Protected Objects and Methods of Protection
Protecting Memory and Addressing
Protecting Access to General Objects
File Protection Mechanisms
User Authentication
Summary of Security for Users
Bibliographic Notes
Terms and Concepts
Exercises
Designing Trusted Operating Systems
What Is a Trusted System? Security Policies
Models of Security
Design of Trusted Operating Systems
Assurance in Trusted Operating Systems
Implementation Examples
Summary of Security in Operating Systems
Bibliographic Notes
Terms and Concepts
Exercises
Data Base Security
Introduction to Data Bases
Security Requirements
Reliability and Integrity
Sensitive Data
Inference Problem
Multilevel Data Bases
Proposals for Multilevel Security
Summary of Data Base Security
Bibliographic Notes
Terms and Concepts
Exercises
Security in Networks and Distributed Systems
Network Concepts
Threats in Networks
Network Security Controls
Privacy Enhanced Electronic Mail
Firewalls
Encrypting Gateway
Multilevel Security on Networks
Summary of Network Security
Bibliographic Notes
Terms and Concepts
Exercises
Administering Security
Personal Computer Security Management
UNIX Security Management
Network Security Management
Risk Analysis
Security Planning
Organizational Security Policies
Summary of Administering Security
Bibliographic Notes
Terms and Concepts
Exercises
Legal and Ethical Issues in Computer Security
Protecting Programs and Data
Information and the Law
Rights of Employees and Employers
Computer Crime
Ethical Issues in Computer Security
Ethical Reasoning
Electronic Privacy
Privacy of Electronic Data
Use of Encryption
Cryptographic Key Escrow
Case Studies of Ethics
Case Studies of Ethics
Codes of Ethics
Conclusion
Bibliographic Notes
Terms and Concepts
Bibliography
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×