Computer Security Principles and Practice

ISBN-10: 0136004245
ISBN-13: 9780136004240
Edition: 2008
List price: $127.00 Buy it from $0.01 Rent it from $24.13
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: In recent years, the need for education in computer security and related topics has grown dramatically nbsp;and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides  More...

Used Starting from $0.69
Rent Starting from $24.13
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Medical Terminology Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $127.00
Copyright year: 2008
Publisher: Prentice Hall PTR
Publication date: 8/2/2007
Binding: Hardcover
Pages: 512
Size: 7.25" wide x 9.25" long x 1.00" tall
Weight: 2.926
Language: English

In recent years, the need for education in computer security and related topics has grown dramatically nbsp;and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. nbsp; Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

Michael D. (Mick) Bauer, CISSP, is Network Security Architect for alarge financial services provider. He is also Security Editor forLinux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security assessment, and the development of security policies and awareness programs.

Notation
Preface
Reader's and Instructor's Guide
Outline of the Book
A Roadmap for Readers and Instructors
Internet and Web Resources
Standards
Overview
Computer Security Concepts
Threats, Attacks, and Assets
Security Functional Requirements
A Security Architecture for Open Systems
The Scope of Computer Security
Computer Security Trends
Computer Security Strategy
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
A Signficant Security Standards and Documents
Computer Security Technology and Principles
Cryptographic Tools
Confidentiality with Symmetric Encryption
Message Authentication and Hash Functions
Public-Key Encryption
Digital Signatures and Key Management
Random and Pseudorandom Numbers
Practical Application: Encryption of Stored Data
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
User Authentication
Means of Authentication
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
Remote User Authentication
Security Issues for User Authentication
Practical Application: An Iris Biometric System
Case Study: Security Problems for ATM Systems
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Access Control
Access Control Principles
Subjects, Objects, and Access Rights
Discretionary Access Control
Example: UNIX File Access Control
Role-Based Access Control
Case Study: RBAC System for a Bank
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Database Security
Relational Databases
Database Access Control
Inference
Statistical Databases
Database Encryption
Recommended Reading
Key Terms, Review Questions, and Problems
Intrusion Detection
Intruders
Intrusion Detection
Host-Based Intrusion Detection
Distr

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×