Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Third Edition
Table of Contents
Copyright
About Prentice Hall Professional Technical Reference
Foreword
Citations
Preface to the Third Edition
Why Read This Book?
Users and Uses of This Book
What Is New in This Book?
Acknowledgments
Chapter 1. Is There a Security Problem in Computing?
1.1 What Does Secure Mean?
1.2 Attacks
1.3 The Meaning of Computer Security
1.4 Computer Criminals
1.5 Methods of Defense
1.6 What s Next
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2. Elementary Cryptography
2.1 Terminology and Background
2.2 Substitution Ciphers
2.3 Transpositions (Permutations)
2.4 Making Good Encryption Algorithms
2.5 The Data Encryption Standard (DES)
2.6 The AES Encryption Algorithm
2.7 Public Key Encryption
2.8 The Uses of Encryption
2.9 Summary of Encryption
2.10 Terms and Concepts
2.11 Where the Field Is Headed
2.12 To Learn More
2.13 Exercises
Chapter 3. Program Security
3.1 Secure Programs
3.2 Nonmalicious Program Errors
3.3 Viruses and Other Malicious Code
3.4 Targeted Malicious Code
3.5 Controls Against Program Threats
3.6 Summary of Program Threats and Controls
3.7 Terms and Concepts
3.8 Where the Field Is Headed
3.9 To Learn More
3.10 Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection
4.2 Memory and Address Protection
4.3 Control of Access to General Objects
4.4 File Protection Mechanisms
4.5 User Authentication
4.6 Summary of Security for Users
4.7 Terms and Concepts
4.8 Where the Field Is Headed
4.9 To Learn More
4.10 Exercises
Chapter 5. Designing Trusted Operating Systems
5.1 What Is a Trusted System?
5.2 Security Policies
5.3 Models of Security
5.4 Trusted Operating System Design
5.5 Assurance in Trusted Operating Systems
5.6 Implementation Examples
5.7 Summary of Security in Operating Systems
5.8 Terms and Concepts
5.9 Where the Field Is Headed
5.10 To Learn More
5.11 Exercises
Chapter 6. Database Security
6.1 Introduction to Databases
6.2 Security Requirements
6.3 Reliability and Integrity
6.4 Sensitive Data
6.5 Inference
6.6 Multilevel Databases
6.7 Proposals for Multilevel Security
6.8 Summary of Database Security
6.9 Terms and Concepts
6.10 Where the Field Is Headed
6.11 To Learn More
6.12 Exercises
Chapter 7. Security in Networks
7.1 Network Concepts
7.2 Threats in Networks
7.3 Network Security Controls
7.4 Firewalls
7.5 Intrusion Detection Systems
7.6 Secure E-Mail
7.7 Summary of Network Security
7.8 Terms and Concepts
7.9 Where the Field Is Headed
7.10 To Learn More
7.11 Exercises
Chapter 8. Administering Security
8.1 Security Planning
8.2 Risk Analysis
8.3 Organizational Security Policies
8.4 Physical Security
8.5 Summary
8.6 Terms and Concepts
8.7 To Learn More
8.8 Exercises
Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security
9.1 Protecting Programs and Data
9.2 Information and the Law
9.3 Rights of Employees and Employers
9.4 Software Failures
9.5 Computer Crime
9.6 Privacy
9.7 Ethical Issues in Computer Security
9.8 Case Studies of Ethics
9.9 Terms and Concepts
9.10 To Learn More
9.11 Exercises
Chapter 10. Cryptography Explained
10.1 Mathematics for Cryptography
10.2 Symmetric Encryption
10.3 Public Key Encryption Systems
10.4 Quantum Cryptography
10.5 Summary of Encryption
10.6 Terms and Concepts
10.7 Where the Field Is Headed
10.8 To Learn More
10.9 Exercises
Bibliography
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Developing the Work Breakdown Structure
What Is a WBS Exactly?
Common Project Change Control Challenges
Managing Project Deliverables
Proven Techniques
Certified Ethical Hacker Exam Prep
Sniffers, Session Hijacking, and Denial of Service
Database Overview
Algorithms
Cryptography
Updates
Cisco IOS Cookbook (Cookbooks (OReilly))
Viewing OSPF Status with Domain Names
Setting the Time
Simple Bridging
Converting Ethernet and Token Ring MAC Addresses
Configuring Multiple DHCP Servers per Subnet
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 10. Georeference Digital Photos
Hack 41. Plot Points on an Interactive Map Using DHTML
Hack 65. Extract Data from Maps with Manifold
Hacks 87-92
Hack 95. Model Interactive Spaces
PMP Practice Questions Exam Cram 2
Answers and Explanations
Exam Prep Questions
Exam Prep Questions
Answers and Explanations
Exam Prep Questions
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Cultural Spectacles
Americanization versus Asianization
Empires Past, Present, and Future
Appendix B Leadership Test
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies