Table of Contents

 <  Free Open Study  >  

   
¢   Table of Contents
Security in Computing, Third Edition
By Charles  P.  Pfleeger, Shari  Lawrence  Pfleeger
 
Publisher : Prentice Hall PTR
Pub Date : December 02, 2002
ISBN : 0-13-035548-8
Pages : 746
   


            
      Copyright
      About Prentice Hall Professional Technical Reference
      Foreword
        Citations
      Preface to the Third Edition
        Why Read This Book?
        Users and Uses of This Book
        What Is New in This Book?
        Acknowledgments
      Chapter 1.   Is There a Security Problem in Computing?
        Section 1.1.   What Does "Secure" Mean?
        Section 1.2.   Attacks
        Section 1.3.   The Meaning of Computer Security
        Section 1.4.   Computer Criminals
        Section 1.5.   Methods of Defense
        Section 1.6.   What's Next
        Section 1.7.   Summary
        Section 1.8.   Terms and Concepts
        Section 1.9.   Where the Field Is Headed
        Section 1.10.   To Learn More
        Section 1.11.   Exercises
      Chapter 2.   Elementary Cryptography
        Section 2.1.   Terminology and Background
        Section 2.2.   Substitution Ciphers
        Section 2.3.   Transpositions (Permutations)
        Section 2.4.   Making "Good" Encryption Algorithms
        Section 2.5.   The Data Encryption Standard (DES)
        Section 2.6.   The AES Encryption Algorithm
        Section 2.7.   Public Key Encryption
        Section 2.8.   The Uses of Encryption
        Section 2.9.   Summary of Encryption
        Section 2.10.   Terms and Concepts
        Section 2.11.   Where the Field Is Headed
        Section 2.12.   To Learn More
        Section 2.13.   Exercises
      Chapter 3.   Program Security
        Section 3.1.   Secure Programs
        Section 3.2.   Nonmalicious Program Errors
        Section 3.3.   Viruses and Other Malicious Code
        Section 3.4.   Targeted Malicious Code
        Section 3.5.   Controls Against Program Threats
        Section 3.6.   Summary of Program Threats and Controls
        Section 3.7.   Terms and Concepts
        Section 3.8.   Where the Field Is Headed
        Section 3.9.   To Learn More
        Section 3.10.   Exercises
      Chapter 4.   Protection in General-Purpose Operating Systems
        Section 4.1.   Protected Objects and Methods of Protection
        Section 4.2.   Memory and Address Protection
        Section 4.3.   Control of Access to General Objects
        Section 4.4.   File Protection Mechanisms
        Section 4.5.   User Authentication
        Section 4.6.   Summary of Security for Users
        Section 4.7.   Terms and Concepts
        Section 4.8.   Where the Field Is Headed
        Section 4.9.   To Learn More
        Section 4.10.   Exercises
      Chapter 5.   Designing Trusted Operating Systems
        Section 5.1.   What Is a Trusted System?
        Section 5.2.   Security Policies
        Section 5.3.   Models of Security
        Section 5.4.   Trusted Operating System Design
        Section 5.5.   Assurance in Trusted Operating Systems
        Section 5.6.   Implementation Examples
        Section 5.7.   Summary of Security in Operating Systems
        Section 5.8.   Terms and Concepts
        Section 5.9.   Where the Field Is Headed
        Section 5.10.   To Learn More
        Section 5.11.   Exercises
      Chapter 6.   Database Security
        Section 6.1.   Introduction to Databases
        Section 6.2.   Security Requirements
        Section 6.3.   Reliability and Integrity
        Section 6.4.   Sensitive Data
        Section 6.5.   Inference
        Section 6.6.   Multilevel Databases
        Section 6.7.   Proposals for Multilevel Security
        Section 6.8.   Summary of Database Security
        Section 6.9.   Terms and Concepts
        Section 6.10.   Where the Field Is Headed
        Section 6.11.   To Learn More
        Section 6.12.   Exercises
      Chapter 7.   Security in Networks
        Section 7.1.   Network Concepts
        Section 7.2.   Threats in Networks
        Section 7.3.   Network Security Controls
        Section 7.4.   Firewalls
        Section 7.5.   Intrusion Detection Systems
        Section 7.6.   Secure E-Mail
        Section 7.7.   Summary of Network Security
        Section 7.8.   Terms and Concepts
        Section 7.9.   Where the Field Is Headed
        Section 7.10.   To Learn More
        Section 7.11.   Exercises
      Chapter 8.   Administering Security
        Section 8.1.   Security Planning
        Section 8.2.   Risk Analysis
        Section 8.3.   Organizational Security Policies
        Section 8.4.   Physical Security
        Section 8.5.   Summary
        Section 8.6.   Terms and Concepts
        Section 8.7.   To Learn More
        Section 8.8.   Exercises
      Chapter 9.   Legal, Privacy, and Ethical Issues in Computer Security
        Section 9.1.   Protecting Programs and Data
        Section 9.2.   Information and the Law
        Section 9.3.   Rights of Employees and Employers
        Section 9.4.   Software Failures
        Section 9.5.   Computer Crime
        Section 9.6.   Privacy
        Section 9.7.   Ethical Issues in Computer Security
        Section 9.8.   Case Studies of Ethics
        Section 9.9.   Terms and Concepts
        Section 9.10.   To Learn More
        Section 9.11.   Exercises
      Chapter 10.   Cryptography Explained
        Section 10.1.   Mathematics for Cryptography
        Section 10.2.   Symmetric Encryption
        Section 10.3.   Public Key Encryption Systems
        Section 10.4.   Quantum Cryptography
        Section 10.5.   Summary of Encryption
        Section 10.6.   Terms and Concepts
        Section 10.7.   Where the Field Is Headed
        Section 10.8.   To Learn More
        Section 10.9.   Exercises
      Bibliography
 <  Free Open Study  >  


Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net