Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Third Edition
Table of Contents
Copyright
About Prentice Hall Professional Technical Reference
Foreword
Citations
Preface to the Third Edition
Why Read This Book?
Users and Uses of This Book
What Is New in This Book?
Acknowledgments
Chapter 1. Is There a Security Problem in Computing?
1.1 What Does Secure Mean?
1.2 Attacks
1.3 The Meaning of Computer Security
1.4 Computer Criminals
1.5 Methods of Defense
1.6 What s Next
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2. Elementary Cryptography
2.1 Terminology and Background
2.2 Substitution Ciphers
2.3 Transpositions (Permutations)
2.4 Making Good Encryption Algorithms
2.5 The Data Encryption Standard (DES)
2.6 The AES Encryption Algorithm
2.7 Public Key Encryption
2.8 The Uses of Encryption
2.9 Summary of Encryption
2.10 Terms and Concepts
2.11 Where the Field Is Headed
2.12 To Learn More
2.13 Exercises
Chapter 3. Program Security
3.1 Secure Programs
3.2 Nonmalicious Program Errors
3.3 Viruses and Other Malicious Code
3.4 Targeted Malicious Code
3.5 Controls Against Program Threats
3.6 Summary of Program Threats and Controls
3.7 Terms and Concepts
3.8 Where the Field Is Headed
3.9 To Learn More
3.10 Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection
4.2 Memory and Address Protection
4.3 Control of Access to General Objects
4.4 File Protection Mechanisms
4.5 User Authentication
4.6 Summary of Security for Users
4.7 Terms and Concepts
4.8 Where the Field Is Headed
4.9 To Learn More
4.10 Exercises
Chapter 5. Designing Trusted Operating Systems
5.1 What Is a Trusted System?
5.2 Security Policies
5.3 Models of Security
5.4 Trusted Operating System Design
5.5 Assurance in Trusted Operating Systems
5.6 Implementation Examples
5.7 Summary of Security in Operating Systems
5.8 Terms and Concepts
5.9 Where the Field Is Headed
5.10 To Learn More
5.11 Exercises
Chapter 6. Database Security
6.1 Introduction to Databases
6.2 Security Requirements
6.3 Reliability and Integrity
6.4 Sensitive Data
6.5 Inference
6.6 Multilevel Databases
6.7 Proposals for Multilevel Security
6.8 Summary of Database Security
6.9 Terms and Concepts
6.10 Where the Field Is Headed
6.11 To Learn More
6.12 Exercises
Chapter 7. Security in Networks
7.1 Network Concepts
7.2 Threats in Networks
7.3 Network Security Controls
7.4 Firewalls
7.5 Intrusion Detection Systems
7.6 Secure E-Mail
7.7 Summary of Network Security
7.8 Terms and Concepts
7.9 Where the Field Is Headed
7.10 To Learn More
7.11 Exercises
Chapter 8. Administering Security
8.1 Security Planning
8.2 Risk Analysis
8.3 Organizational Security Policies
8.4 Physical Security
8.5 Summary
8.6 Terms and Concepts
8.7 To Learn More
8.8 Exercises
Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security
9.1 Protecting Programs and Data
9.2 Information and the Law
9.3 Rights of Employees and Employers
9.4 Software Failures
9.5 Computer Crime
9.6 Privacy
9.7 Ethical Issues in Computer Security
9.8 Case Studies of Ethics
9.9 Terms and Concepts
9.10 To Learn More
9.11 Exercises
Chapter 10. Cryptography Explained
10.1 Mathematics for Cryptography
10.2 Symmetric Encryption
10.3 Public Key Encryption Systems
10.4 Quantum Cryptography
10.5 Summary of Encryption
10.6 Terms and Concepts
10.7 Where the Field Is Headed
10.8 To Learn More
10.9 Exercises
Bibliography
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Documenting Software Architectures: Views and Beyond
Summary Checklist
Deployment Style
Discussion Questions
Documenting Variability and Dynamism
Other Views and Beyond
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
The CASE Expression
Summary
Defining the Data Type in PostgreSQL
Summary
pgcurlWeb-enabling Your PostgreSQL Server
Sap Bw: a Step By Step Guide for Bw 2.0
Creating InfoObject Catalogs
Create an InfoPackage to Load Transaction Data
Summary
Creating DataSources in R/3 and Replicating Them to BW
Creating a Characteristic in BW
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Risk-Adjusted Financial Management
Quantitative Time Management
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Design-Time Support for Custom Controls
Data Controls
GDI+ Basics
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies