| | Copyright |
| | About Prentice Hall Professional Technical Reference |
| | Foreword |
| | | Citations |
| | Preface to the Third Edition |
| | | Why Read This Book? |
| | | Users and Uses of This Book |
| | | What Is New in This Book? |
| | | Acknowledgments |
| | Chapter 1. Is There a Security Problem in Computing? |
| | | Section 1.1. What Does "Secure" Mean? |
| | | Section 1.2. Attacks |
| | | Section 1.3. The Meaning of Computer Security |
| | | Section 1.4. Computer Criminals |
| | | Section 1.5. Methods of Defense |
| | | Section 1.6. What's Next |
| | | Section 1.7. Summary |
| | | Section 1.8. Terms and Concepts |
| | | Section 1.9. Where the Field Is Headed |
| | | Section 1.10. To Learn More |
| | | Section 1.11. Exercises |
| | Chapter 2. Elementary Cryptography |
| | | Section 2.1. Terminology and Background |
| | | Section 2.2. Substitution Ciphers |
| | | Section 2.3. Transpositions (Permutations) |
| | | Section 2.4. Making "Good" Encryption Algorithms |
| | | Section 2.5. The Data Encryption Standard (DES) |
| | | Section 2.6. The AES Encryption Algorithm |
| | | Section 2.7. Public Key Encryption |
| | | Section 2.8. The Uses of Encryption |
| | | Section 2.9. Summary of Encryption |
| | | Section 2.10. Terms and Concepts |
| | | Section 2.11. Where the Field Is Headed |
| | | Section 2.12. To Learn More |
| | | Section 2.13. Exercises |
| | Chapter 3. Program Security |
| | | Section 3.1. Secure Programs |
| | | Section 3.2. Nonmalicious Program Errors |
| | | Section 3.3. Viruses and Other Malicious Code |
| | | Section 3.4. Targeted Malicious Code |
| | | Section 3.5. Controls Against Program Threats |
| | | Section 3.6. Summary of Program Threats and Controls |
| | | Section 3.7. Terms and Concepts |
| | | Section 3.8. Where the Field Is Headed |
| | | Section 3.9. To Learn More |
| | | Section 3.10. Exercises |
| | Chapter 4. Protection in General-Purpose Operating Systems |
| | | Section 4.1. Protected Objects and Methods of Protection |
| | | Section 4.2. Memory and Address Protection |
| | | Section 4.3. Control of Access to General Objects |
| | | Section 4.4. File Protection Mechanisms |
| | | Section 4.5. User Authentication |
| | | Section 4.6. Summary of Security for Users |
| | | Section 4.7. Terms and Concepts |
| | | Section 4.8. Where the Field Is Headed |
| | | Section 4.9. To Learn More |
| | | Section 4.10. Exercises |
| | Chapter 5. Designing Trusted Operating Systems |
| | | Section 5.1. What Is a Trusted System? |
| | | Section 5.2. Security Policies |
| | | Section 5.3. Models of Security |
| | | Section 5.4. Trusted Operating System Design |
| | | Section 5.5. Assurance in Trusted Operating Systems |
| | | Section 5.6. Implementation Examples |
| | | Section 5.7. Summary of Security in Operating Systems |
| | | Section 5.8. Terms and Concepts |
| | | Section 5.9. Where the Field Is Headed |
| | | Section 5.10. To Learn More |
| | | Section 5.11. Exercises |
| | Chapter 6. Database Security |
| | | Section 6.1. Introduction to Databases |
| | | Section 6.2. Security Requirements |
| | | Section 6.3. Reliability and Integrity |
| | | Section 6.4. Sensitive Data |
| | | Section 6.5. Inference |
| | | Section 6.6. Multilevel Databases |
| | | Section 6.7. Proposals for Multilevel Security |
| | | Section 6.8. Summary of Database Security |
| | | Section 6.9. Terms and Concepts |
| | | Section 6.10. Where the Field Is Headed |
| | | Section 6.11. To Learn More |
| | | Section 6.12. Exercises |
| | Chapter 7. Security in Networks |
| | | Section 7.1. Network Concepts |
| | | Section 7.2. Threats in Networks |
| | | Section 7.3. Network Security Controls |
| | | Section 7.4. Firewalls |
| | | Section 7.5. Intrusion Detection Systems |
| | | Section 7.6. Secure E-Mail |
| | | Section 7.7. Summary of Network Security |
| | | Section 7.8. Terms and Concepts |
| | | Section 7.9. Where the Field Is Headed |
| | | Section 7.10. To Learn More |
| | | Section 7.11. Exercises |
| | Chapter 8. Administering Security |
| | | Section 8.1. Security Planning |
| | | Section 8.2. Risk Analysis |
| | | Section 8.3. Organizational Security Policies |
| | | Section 8.4. Physical Security |
| | | Section 8.5. Summary |
| | | Section 8.6. Terms and Concepts |
| | | Section 8.7. To Learn More |
| | | Section 8.8. Exercises |
| | Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security |
| | | Section 9.1. Protecting Programs and Data |
| | | Section 9.2. Information and the Law |
| | | Section 9.3. Rights of Employees and Employers |
| | | Section 9.4. Software Failures |
| | | Section 9.5. Computer Crime |
| | | Section 9.6. Privacy |
| | | Section 9.7. Ethical Issues in Computer Security |
| | | Section 9.8. Case Studies of Ethics |
| | | Section 9.9. Terms and Concepts |
| | | Section 9.10. To Learn More |
| | | Section 9.11. Exercises |
| | Chapter 10. Cryptography Explained |
| | | Section 10.1. Mathematics for Cryptography |
| | | Section 10.2. Symmetric Encryption |
| | | Section 10.3. Public Key Encryption Systems |
| | | Section 10.4. Quantum Cryptography |
| | | Section 10.5. Summary of Encryption |
| | | Section 10.6. Terms and Concepts |
| | | Section 10.7. Where the Field Is Headed |
| | | Section 10.8. To Learn More |
| | | Section 10.9. Exercises |
| | Bibliography |