Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Third Edition
Table of Contents
Copyright
About Prentice Hall Professional Technical Reference
Foreword
Citations
Preface to the Third Edition
Why Read This Book?
Users and Uses of This Book
What Is New in This Book?
Acknowledgments
Chapter 1. Is There a Security Problem in Computing?
1.1 What Does Secure Mean?
1.2 Attacks
1.3 The Meaning of Computer Security
1.4 Computer Criminals
1.5 Methods of Defense
1.6 What s Next
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2. Elementary Cryptography
2.1 Terminology and Background
2.2 Substitution Ciphers
2.3 Transpositions (Permutations)
2.4 Making Good Encryption Algorithms
2.5 The Data Encryption Standard (DES)
2.6 The AES Encryption Algorithm
2.7 Public Key Encryption
2.8 The Uses of Encryption
2.9 Summary of Encryption
2.10 Terms and Concepts
2.11 Where the Field Is Headed
2.12 To Learn More
2.13 Exercises
Chapter 3. Program Security
3.1 Secure Programs
3.2 Nonmalicious Program Errors
3.3 Viruses and Other Malicious Code
3.4 Targeted Malicious Code
3.5 Controls Against Program Threats
3.6 Summary of Program Threats and Controls
3.7 Terms and Concepts
3.8 Where the Field Is Headed
3.9 To Learn More
3.10 Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection
4.2 Memory and Address Protection
4.3 Control of Access to General Objects
4.4 File Protection Mechanisms
4.5 User Authentication
4.6 Summary of Security for Users
4.7 Terms and Concepts
4.8 Where the Field Is Headed
4.9 To Learn More
4.10 Exercises
Chapter 5. Designing Trusted Operating Systems
5.1 What Is a Trusted System?
5.2 Security Policies
5.3 Models of Security
5.4 Trusted Operating System Design
5.5 Assurance in Trusted Operating Systems
5.6 Implementation Examples
5.7 Summary of Security in Operating Systems
5.8 Terms and Concepts
5.9 Where the Field Is Headed
5.10 To Learn More
5.11 Exercises
Chapter 6. Database Security
6.1 Introduction to Databases
6.2 Security Requirements
6.3 Reliability and Integrity
6.4 Sensitive Data
6.5 Inference
6.6 Multilevel Databases
6.7 Proposals for Multilevel Security
6.8 Summary of Database Security
6.9 Terms and Concepts
6.10 Where the Field Is Headed
6.11 To Learn More
6.12 Exercises
Chapter 7. Security in Networks
7.1 Network Concepts
7.2 Threats in Networks
7.3 Network Security Controls
7.4 Firewalls
7.5 Intrusion Detection Systems
7.6 Secure E-Mail
7.7 Summary of Network Security
7.8 Terms and Concepts
7.9 Where the Field Is Headed
7.10 To Learn More
7.11 Exercises
Chapter 8. Administering Security
8.1 Security Planning
8.2 Risk Analysis
8.3 Organizational Security Policies
8.4 Physical Security
8.5 Summary
8.6 Terms and Concepts
8.7 To Learn More
8.8 Exercises
Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security
9.1 Protecting Programs and Data
9.2 Information and the Law
9.3 Rights of Employees and Employers
9.4 Software Failures
9.5 Computer Crime
9.6 Privacy
9.7 Ethical Issues in Computer Security
9.8 Case Studies of Ethics
9.9 Terms and Concepts
9.10 To Learn More
9.11 Exercises
Chapter 10. Cryptography Explained
10.1 Mathematics for Cryptography
10.2 Symmetric Encryption
10.3 Public Key Encryption Systems
10.4 Quantum Cryptography
10.5 Summary of Encryption
10.6 Terms and Concepts
10.7 Where the Field Is Headed
10.8 To Learn More
10.9 Exercises
Bibliography
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Network Security Architectures
Network Security Axioms
IP Addressing Design Considerations
ICMP Design Considerations
Identity Design Considerations
Applied Knowledge Questions
Managing Enterprise Systems with the Windows Script Host
Networking Resources
File Operations
Input/Output Streams
Network Administration/WMI
Data Access
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Address Resolution Protocol (ARP)
Internet Protocol (IP) Basics
User Datagram Protocol
Transmission Control Protocol (TCP) Retransmission and Time-Out
Dynamic Host Configuration Protocol (DHCP) Server Service
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Tcpdump
Cisco Secure IDS
Policy and Procedures
The Future of Intrusion Detection and Prevention
MPLS Configuration on Cisco IOS Software
Command Reference
RIPv2 PE-CE Routing Overview, Configuration, and Verification
Option 1: Inter-Provider VPN Using Back-to-Back VRF Method
Deployment Scenarios with CSC Architecture
Introduction to QoS-Classification and Marking
VBScript in a Nutshell, 2nd Edition
VBScripts History and Uses
Error Handling and Debugging
Active Server Pages Object Model
Appendix B. VBScript Constants
Section C.2. String Operator
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies