Computer Security Principles and Practice

ISBN-10: 0136004245

ISBN-13: 9780136004240

Edition: 2008

Authors: William Stallings, Lawrie Brown, Mick Bauer, Michael Howard, Lawrence Brown

List price: $127.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy


In recent years, the need for education in computer security and related topics has grown dramatically nbsp;and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. nbsp; Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.
what's this?
Rush Rewards U
Members Receive:
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
Medical Terminology Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Customers also bought

Book details

List price: $127.00
Copyright year: 2008
Publisher: Prentice Hall PTR
Publication date: 8/2/2007
Binding: Hardcover
Pages: 512
Size: 7.25" wide x 9.25" long x 1.00" tall
Weight: 2.904
Language: English

Michael D. (Mick) Bauer, CISSP, is Network Security Architect for alarge financial services provider. He is also Security Editor forLinux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security assessment, and the development of security policies and awareness programs.

Reader's and Instructor's Guide
Outline of the Book
A Roadmap for Readers and Instructors
Internet and Web Resources
Computer Security Concepts
Threats, Attacks, and Assets
Security Functional Requirements
A Security Architecture for Open Systems
The Scope of Computer Security
Computer Security Trends
Computer Security Strategy
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
A Signficant Security Standards and Documents
Computer Security Technology and Principles
Cryptographic Tools
Confidentiality with Symmetric Encryption
Message Authentication and Hash Functions
Public-Key Encryption
Digital Signatures and Key Management
Random and Pseudorandom Numbers
Practical Application: Encryption of Stored Data
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
User Authentication
Means of Authentication
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
Remote User Authentication
Security Issues for User Authentication
Practical Application: An Iris Biometric System
Case Study: Security Problems for ATM Systems
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Access Control
Access Control Principles
Subjects, Objects, and Access Rights
Discretionary Access Control
Example: UNIX File Access Control
Role-Based Access Control
Case Study: RBAC System for a Bank
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Database Security
Relational Databases
Database Access Control
Statistical Databases
Database Encryption
Recommended Reading
Key Terms, Review Questions, and Problems
Intrusion Detection
Intrusion Detection
Host-Based Intrusion Detection
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.