Computer Security

ISBN-10: 0470741155
ISBN-13: 9780470741153
Edition: 3rd 2011
Authors: Dieter Gollmann
List price: $115.99 Buy it from $15.06 Rent it from $25.64
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Used Starting from $41.56
New Starting from $72.90
Rent Starting from $25.64
eBooks Starting from $56.25
Rent
Buy
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Calculus 1 Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $115.99
Edition: 3rd
Copyright year: 2011
Publisher: John Wiley & Sons, Limited
Publication date: 12/20/2010
Binding: Paperback
Pages: 456
Size: 7.75" wide x 9.50" long x 1.00" tall
Weight: 1.276

Preface xvii
- History of Computer Security
The Dawn of Computer Security
1970s - Mainframes
1980s - Personal Computers
1990s - Internet
2000s - The Web
Conclusions - The Benefits of Hindsight
Exercises
- Managing Security
Attacks and Attackers
Security Management
Risk and Threat Analysis
Further Reading
Exercises
- Foundations of Computer Security
Definitions
The Fundamental Dilemma of Computer Security
Data vs Information
Principles of Computer Security
The Layer Below
The Layer Above
Further Reading
Exercises
- Identification and Authentication
Username and Password
Bootstrapping Password Protection
Guessing Passwords
Phishing, Spoofing, and Social Engineering
Protecting the Password File
Single Sign-on
Alternative Approaches
Further Reading
Exercises
- Access Control
Background
Authentication and Authorization
Access Operations
Access Control Structures
Ownership
Intermediate Controls
Policy Instantiation
Comparing Security Attributes
Further Reading
Exercises
- Reference Monitors
Introduction
Operating System Integrity
Hardware Security Features
Protecting Memory
Further Reading
Exercises
- Unix Security
Introduction
Principals
Subjects
Objects
Access Control
Instances of General Security Principles
Management Issues
Further Reading
Exercises
- Windows Security
Introduction
Components of Access Control
Access Decisions
Managing Policies
Task-Dependent Access Rights
Administration
Further Reading
Exercises
- Database Security
Introduction
Relational Databases
Access Control
Statistical Database Security
Integration with the Operating System
Privacy
Further Reading
Exercises
- Software Security
Introduction
Characters and Numbers
Canonical Representations
Memory Management
Data and Code
Race Conditions
Defences
Further Reading
Exercises
- Bell-LaPadula Model
State Machine Models
The Bell-LaPadula Model
The Multics Interpretation of BLP
Further Reading
Exercises
- Security Models
The Biba Model
Chinese Wall Model
The Clark-Wilson Model
The Harrison-Ruzzo-Ullman Model
Information-Flow Models
Execution Monitors
Further Reading
Exercises
- Security Evaluation
Introduction
The Orange Book
The Rainbow Series
Information Technology Security Evaluation Criteria
The Federal Criteria
The Common Criteria
Quality Standards
An Effort Well Spent?
Summary
Further Reading
Exercises
- Cryptography
Introduction
Modular Arithmetic
Integrity Check Functions
Digital Signatures
Encryption
Strength of Mechanisms
Performance
Further Reading
Exercises
- Key Establishment
Introduction
Key Establishment and Authentication
Key Establishment Protocols
Kerberos
Public-Key Infrastructures
Trusted Computing - Attestation
Further Reading
Exercises
- Communications Security
Introduction
Protocol Design Principles
IP Security
IPsec and Network Address Translation
SSL/TLS
Extensible Authentication Protocol
Further Reading
Exercises
- Network Security
Introduction
Domain Name System
Firewalls
Intrusion Detection
Further Reading
Exercises
- Web Security
Introduction
Authenticated Sessions
Code Origin Policies
Cross-Site Scripting
Cross-Site Request Forgery
JavaScript Hijacking
Web Services Security
Further Reading
Exercises
- Mobility
Introduction
GSM
UMTS
Mobile IPv6 Security
WLAN
Bluetooth
Further Reading
Exercises
- New Access Control Paradigms
Introduction
SPKI
Trust Management
Code-Based Access Control
Java Security
.NET Security Framework
Digital Rights Management
Further Reading
Exercises
Bibliography
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×