Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Third Edition
Table of Contents
Copyright
About Prentice Hall Professional Technical Reference
Foreword
Citations
Preface to the Third Edition
Why Read This Book?
Users and Uses of This Book
What Is New in This Book?
Acknowledgments
Chapter 1. Is There a Security Problem in Computing?
1.1 What Does Secure Mean?
1.2 Attacks
1.3 The Meaning of Computer Security
1.4 Computer Criminals
1.5 Methods of Defense
1.6 What s Next
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2. Elementary Cryptography
2.1 Terminology and Background
2.2 Substitution Ciphers
2.3 Transpositions (Permutations)
2.4 Making Good Encryption Algorithms
2.5 The Data Encryption Standard (DES)
2.6 The AES Encryption Algorithm
2.7 Public Key Encryption
2.8 The Uses of Encryption
2.9 Summary of Encryption
2.10 Terms and Concepts
2.11 Where the Field Is Headed
2.12 To Learn More
2.13 Exercises
Chapter 3. Program Security
3.1 Secure Programs
3.2 Nonmalicious Program Errors
3.3 Viruses and Other Malicious Code
3.4 Targeted Malicious Code
3.5 Controls Against Program Threats
3.6 Summary of Program Threats and Controls
3.7 Terms and Concepts
3.8 Where the Field Is Headed
3.9 To Learn More
3.10 Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection
4.2 Memory and Address Protection
4.3 Control of Access to General Objects
4.4 File Protection Mechanisms
4.5 User Authentication
4.6 Summary of Security for Users
4.7 Terms and Concepts
4.8 Where the Field Is Headed
4.9 To Learn More
4.10 Exercises
Chapter 5. Designing Trusted Operating Systems
5.1 What Is a Trusted System?
5.2 Security Policies
5.3 Models of Security
5.4 Trusted Operating System Design
5.5 Assurance in Trusted Operating Systems
5.6 Implementation Examples
5.7 Summary of Security in Operating Systems
5.8 Terms and Concepts
5.9 Where the Field Is Headed
5.10 To Learn More
5.11 Exercises
Chapter 6. Database Security
6.1 Introduction to Databases
6.2 Security Requirements
6.3 Reliability and Integrity
6.4 Sensitive Data
6.5 Inference
6.6 Multilevel Databases
6.7 Proposals for Multilevel Security
6.8 Summary of Database Security
6.9 Terms and Concepts
6.10 Where the Field Is Headed
6.11 To Learn More
6.12 Exercises
Chapter 7. Security in Networks
7.1 Network Concepts
7.2 Threats in Networks
7.3 Network Security Controls
7.4 Firewalls
7.5 Intrusion Detection Systems
7.6 Secure E-Mail
7.7 Summary of Network Security
7.8 Terms and Concepts
7.9 Where the Field Is Headed
7.10 To Learn More
7.11 Exercises
Chapter 8. Administering Security
8.1 Security Planning
8.2 Risk Analysis
8.3 Organizational Security Policies
8.4 Physical Security
8.5 Summary
8.6 Terms and Concepts
8.7 To Learn More
8.8 Exercises
Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security
9.1 Protecting Programs and Data
9.2 Information and the Law
9.3 Rights of Employees and Employers
9.4 Software Failures
9.5 Computer Crime
9.6 Privacy
9.7 Ethical Issues in Computer Security
9.8 Case Studies of Ethics
9.9 Terms and Concepts
9.10 To Learn More
9.11 Exercises
Chapter 10. Cryptography Explained
10.1 Mathematics for Cryptography
10.2 Symmetric Encryption
10.3 Public Key Encryption Systems
10.4 Quantum Cryptography
10.5 Summary of Encryption
10.6 Terms and Concepts
10.7 Where the Field Is Headed
10.8 To Learn More
10.9 Exercises
Bibliography
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Scope Risk
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Closing Projects
Appendix A Selected Detail From the PERIL Database
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Working with Functions, Parameters, and Data Types
Understanding Transaction Isolation Levels and Concurrent Processing
Working with Stored Procedures
Repairing and Maintaining MS-SQL Server Database Files
C & Data Structures (Charles River Media Computer Engineering)
Control Structures
The printf Function
Preprocessing
Storage of Variables
Stacks and Queues
.NET-A Complete Development Cycle
Introducing .NET
Using Pens and Brushes in GDI+
Three-Dimensional Rendering Technologies
Performance Optimization, Multithreading, and Profiling
Deployment
Programming .Net Windows Applications
Events
TreeView and ListView
Writing It by Hand
Bugs Versus Exceptions
Throwing and Catching Exceptions
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
Files and Directories
XML
Windows Controls
Security and Cryptography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies