Craft of System Security

ISBN-10: 0321434838
ISBN-13: 9780321434838
Edition: 2008
List price: $69.99
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: "I believeThe Craft of System Securityis one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human  More...

eBooks Starting from $55.99
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $69.99
Copyright year: 2008
Publisher: Addison Wesley Professional
Publication date: 11/21/2007
Binding: Paperback
Pages: 592
Size: 7.00" wide x 9.25" long x 1.00" tall
Weight: 1.650
Language: English

"I believeThe Craft of System Securityis one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how to improve the security of software systems by improving hardware. Bottom line, this book should be required reading for all who plan to call themselves security practitioners, and an invaluable part of every universitys computer science curriculum." --Edward Bonver, CISSP, Senior Software QA Engineer, Product Security, Symantec Corporation "Heres to a fun, exciting read: a unique book chock-full of practical examples of the uses and the misuses of computer security. I expect that it will motivate a good number of college students to want to learn more about the field, at the same time that it will satisfy the more experienced professional." --L. Felipe Perrone, Department of Computer Science, Bucknell University Whether youre a security practitioner, developer, manager, or administrator, this book will give you the deep understanding necessary to meet todays security challenges--and anticipate tomorrows. Unlike most books,The Craft of System Securitydoesnt just review the modern security practitioners toolkit: It explains why each tool exists, and discusses how to use it to solve real problems. After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding todays systems and vulnerabilities. Next, they systematically introduce the basic building blocks for securing contemporary systems, apply those building blocks to todays applications, and consider important emerging trends such as hardware-based security. After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a systems security Discover the security, privacy, and trust issues arising from desktop productivity tools Understand digital rights management, watermarking, information hiding, and policy expression Learn principles of human-computer interaction (HCI) design for improved security Understand the potential of emerging work in hardware-based security and trusted computing

Preface
Acknowledgments
History
Introduction
The Standard Rubric
The Matrix
Other Views
Safe States and the Access Control Matrix
Other Hard Questions
The Take-Home Message
Project Ideas
The Old Testament
The Basic Framework
Security Models
The Orange Book
INFOSEC, OPSEC, JOBSEC
The Take-Home Message
Project Ideas
Old Principles, New World
Solving the Wrong Problem?
Lack of Follow-Through?
Too Unwieldy?
Saltzer and Schroeder
Modern Relevance
The Take-Home Messagev57
Project Ideas
OS Security
OS Background
OS Security Primitives and Principles
Real OSes: Everything but the Kitchen Sink
When the Foundation Cracks
Where Are We?
The Take-Home Message
Project Ideas
Network Security
Basic Framework
Protocols
The Network as a Battlefield
The Brave New World
The Take-Home Message
Project Ideas
Implementation Security
Buffer Overflow
Argument Validation and Other Mishaps
TOCTOU
Malware
Programming Language Security
Security in the Development Lifecycle
The Take-Home Message
Project Ideas
Using Cryptography
Framework and Terminology
Randomness
Symmetric Cryptography
Applications of Symmetric Cryptography
Public-Key Cryptography
Hash Functions
Practical Issues: Public Key
Past and Future
The Take-Home Message
Project Ideas
Subverting Cryptography
Breaking Symmetric Key without Brute Force
Breaking Symmetric Key with Brute Force
Breaking Public Key without Factoring
Breaking Cryptography via the Real World
The Potential of Efficiently Factoring Moduli
The Take-Home Message
Project Ideas
Authentication
Basic Framework
Authenticating Humans
Human Factors
From the Machine's Point of View
Advanced Approaches
Case Studies
Broader Issues
The Take-Home Message
Project Ideas
Public Key Infrastructure
Basic Definitions
Basic Structure
Complexity Arrives
Multiple CAs
Revocation
The X.509 World
Dissent
Ongoing Trouble
The Take-Home Message
Project Ideas
Standards, Compliance, and Testing
Standards
Policy Compliance
Testing
The Take-Home Message
Project Ideas
The Web and Security
Basic Structure
Security Techniques
Privacy Issues
Web Services
The Take-Home Message
Project Ideas
Office Tools and Security
Word
Lotus 1-2-3
PDF
Cut-and-Paste
PKI and Office Tools
Mental Models
The Take-Home Message
Project Ideas
Money, Time, Property
Money
Time
Property
The Take-Home Message
Project Ideas
Formal Methods and Security
Specification
Logics
Cranking the Handle
Case Studies
Spinning Your Bank Account
Limits
The Take-Home Message
Project Ideas

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×