Security in Computing / Edition 3

Security in Computing / Edition 3

by Charles P. Pfleeger
     
 

Provides coverage that is extremely up to date.

Offers extended coverage of network security issues.

Explains cryptology in depth.

Brings together core computer science concepts of operating systems, networks, database management systems, and program development techniques, while making accessible the mathematical and formal topics of computation

See more details below

Overview

Provides coverage that is extremely up to date.

Offers extended coverage of network security issues.

Explains cryptology in depth.

Brings together core computer science concepts of operating systems, networks, database management systems, and program development techniques, while making accessible the mathematical and formal topics of computation complexity, number theory, cryptography, and protocols.

Contains pedagogical aids, such as an overview of key points to be learned in the chapter, a review of what the chapter has covered, a list of new terms and concepts, notes on key bibliographic references, and exercises to check understanding.

Offers a layered presentation and comprehensive coverage of all aspects of security, allowing instructors to decide which topics to cover and how deeply to cover them.

Covers key topics—vulnerabilities and controls—to the security of today's information systems, including...

  • Firewalls.
  • Privacy enhanced e-mail (PEM, PGP).
  • Viruses, worms, Trojan horses, other malicious code.
  • Cryptographic key escrow (e.g., "Clipper" /Fortezza).
  • Risks in the World Wide Web and the Internet.
  • Software quality, including ISO 9000 and the SEI CMM.
  • Password security.
  • Contingency planning.
  • Digital signatures, including DSS.
  • Public key cryptosystems, including RSA and El Gamal.
  • Assurance evaluation—the Common Criteria, the ITSEC, the U.S. "Orange Book".
  • Management and administration of secure installations.
  • Security for the PC user—standalone and networked.
  • Risk analysis.

Offers over 175 exercises and six case studies.

Read More

Product Details

ISBN-13:
9780130355485
Publisher:
Prentice Hall Professional Technical Reference
Publication date:
11/30/2002
Edition description:
Older Edition
Pages:
746
Product dimensions:
7.10(w) x 9.40(h) x 1.30(d)

Table of Contents

Foreword
Preface to the Third Edition
Ch. 1Is There a Security Problem in Computing?1
Ch. 2Elementary Cryptography35
Ch. 3Program Security95
Ch. 4Protection in General-Purpose Operating Systems179
Ch. 5Designing Trusted Operating Systems229
Ch. 6Database Security309
Ch. 7Security in Networks363
Ch. 8Administering Security491
Ch. 9Legal, Privacy, and Ethical Issues in Computer Security553
Ch. 10Cryptography Explained629
Bibliography691
Index727

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >