Skip to content

Computer Security Principles and Practice

Best in textbook rentals since 2012!

ISBN-10: 0136004245

ISBN-13: 9780136004240

Edition: 2008

Authors: William Stallings, Lawrie Brown, Mick Bauer, Michael Howard, Lawrence Brown

List price: $127.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

In recent years, the need for education in computer security and related topics has grown dramatically nbsp;and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. nbsp; Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and…    
Customers also bought

Book details

List price: $127.00
Copyright year: 2008
Publisher: Prentice Hall PTR
Publication date: 8/2/2007
Binding: Hardcover
Pages: 512
Size: 7.25" wide x 9.25" long x 1.00" tall
Weight: 2.882
Language: English

Michael D. (Mick) Bauer, CISSP, is Network Security Architect for alarge financial services provider. He is also Security Editor forLinux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security assessment, and the development of security policies and awareness programs.

Notation
Preface
Reader's and Instructor's Guide
Outline of the Book
A Roadmap for Readers and Instructors
Internet and Web Resources
Standards
Overview
Computer Security Concepts
Threats, Attacks, and Assets
Security Functional Requirements
A Security Architecture for Open Systems
The Scope of Computer Security
Computer Security Trends
Computer Security Strategy
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
A Signficant Security Standards and Documents
Computer Security Technology and Principles
Cryptographic Tools
Confidentiality with Symmetric Encryption
Message Authentication and Hash Functions
Public-Key Encryption
Digital Signatures and Key Management
Random and Pseudorandom Numbers
Practical Application: Encryption of Stored Data
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
User Authentication
Means of Authentication
Password-Based Authentication
Token-Based Authentication
Biometric Authentication
Remote User Authentication
Security Issues for User Authentication
Practical Application: An Iris Biometric System
Case Study: Security Problems for ATM Systems
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Access Control
Access Control Principles
Subjects, Objects, and Access Rights
Discretionary Access Control
Example: UNIX File Access Control
Role-Based Access Control
Case Study: RBAC System for a Bank
Recommended Reading and Web Sites
Key Terms, Review Questions, and Problems
Database Security
Relational Databases
Database Access Control
Inference
Statistical Databases
Database Encryption
Recommended Reading
Key Terms, Review Questions, and Problems
Intrusion Detection
Intruders
Intrusion Detection
Host-Based Intrusion Detection
Distr