Computer Security / Edition 3

Computer Security / Edition 3

5.0 1
by Dieter Gollmann
     
 

A completely up-to-date resource on computer security

Assuming no previous experience in the field of computersecurity, this must-have book walks you through the many essentialaspects of this vast topic, from the newest advances in softwareand technology to the most recent information on Web applicationssecurity. This new edition includes sections on

See more details below

Overview

A completely up-to-date resource on computer security

Assuming no previous experience in the field of computersecurity, this must-have book walks you through the many essentialaspects of this vast topic, from the newest advances in softwareand technology to the most recent information on Web applicationssecurity. This new edition includes sections on Windows NT, CORBA,and Java and discusses cross-site scripting and JavaScript hackingas well as SQL injection. Serving as a helpful introduction, thisself-study guide is a wonderful starting point for examining thevariety of competing security systems and what makes them differentfrom one another.

  • Unravels the complex topic of computer security and breaks itdown in such a way as to serve as an ideal introduction forbeginners in the field of computer security
  • Examines the foundations of computer security and its basicprinciples
  • Addresses username and password, password protection, singlesign-on, and more
  • Discusses operating system integrity, hardware securityfeatures, and memory
  • Covers Unix security, Windows security, database security,network security, web security, and software security

Packed with in-depth coverage, this resource spares no detailswhen it comes to the critical topic of computer security.

Read More

Product Details

ISBN-13:
9780470741153
Publisher:
Wiley
Publication date:
03/15/2011
Edition description:
New Edition
Pages:
456
Sales rank:
802,496
Product dimensions:
7.30(w) x 9.20(h) x 1.00(d)

Table of Contents

Ch. 1Introduction1
Ch. 2Foundations of computer security17
Ch. 3Identification and authentication35
Ch. 4Access control51
Ch. 5Reference monitors71
Ch. 6Unix security91
Ch. 7Windows 2000 security115
Ch. 8Bell-LaPadula model139
Ch. 9Security models153
Ch. 10Security evaluation169
Ch. 11Cryptography185
Ch. 12Authentication in distributed systems211
Ch. 13Network security233
Ch. 14Software security257
Ch. 15New access control paradigms283
Ch. 16Mobility307
Ch. 17Database security327

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >