Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Third Edition
Table of Contents
Copyright
About Prentice Hall Professional Technical Reference
Foreword
Citations
Preface to the Third Edition
Why Read This Book?
Users and Uses of This Book
What Is New in This Book?
Acknowledgments
Chapter 1. Is There a Security Problem in Computing?
1.1 What Does Secure Mean?
1.2 Attacks
1.3 The Meaning of Computer Security
1.4 Computer Criminals
1.5 Methods of Defense
1.6 What s Next
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2. Elementary Cryptography
2.1 Terminology and Background
2.2 Substitution Ciphers
2.3 Transpositions (Permutations)
2.4 Making Good Encryption Algorithms
2.5 The Data Encryption Standard (DES)
2.6 The AES Encryption Algorithm
2.7 Public Key Encryption
2.8 The Uses of Encryption
2.9 Summary of Encryption
2.10 Terms and Concepts
2.11 Where the Field Is Headed
2.12 To Learn More
2.13 Exercises
Chapter 3. Program Security
3.1 Secure Programs
3.2 Nonmalicious Program Errors
3.3 Viruses and Other Malicious Code
3.4 Targeted Malicious Code
3.5 Controls Against Program Threats
3.6 Summary of Program Threats and Controls
3.7 Terms and Concepts
3.8 Where the Field Is Headed
3.9 To Learn More
3.10 Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection
4.2 Memory and Address Protection
4.3 Control of Access to General Objects
4.4 File Protection Mechanisms
4.5 User Authentication
4.6 Summary of Security for Users
4.7 Terms and Concepts
4.8 Where the Field Is Headed
4.9 To Learn More
4.10 Exercises
Chapter 5. Designing Trusted Operating Systems
5.1 What Is a Trusted System?
5.2 Security Policies
5.3 Models of Security
5.4 Trusted Operating System Design
5.5 Assurance in Trusted Operating Systems
5.6 Implementation Examples
5.7 Summary of Security in Operating Systems
5.8 Terms and Concepts
5.9 Where the Field Is Headed
5.10 To Learn More
5.11 Exercises
Chapter 6. Database Security
6.1 Introduction to Databases
6.2 Security Requirements
6.3 Reliability and Integrity
6.4 Sensitive Data
6.5 Inference
6.6 Multilevel Databases
6.7 Proposals for Multilevel Security
6.8 Summary of Database Security
6.9 Terms and Concepts
6.10 Where the Field Is Headed
6.11 To Learn More
6.12 Exercises
Chapter 7. Security in Networks
7.1 Network Concepts
7.2 Threats in Networks
7.3 Network Security Controls
7.4 Firewalls
7.5 Intrusion Detection Systems
7.6 Secure E-Mail
7.7 Summary of Network Security
7.8 Terms and Concepts
7.9 Where the Field Is Headed
7.10 To Learn More
7.11 Exercises
Chapter 8. Administering Security
8.1 Security Planning
8.2 Risk Analysis
8.3 Organizational Security Policies
8.4 Physical Security
8.5 Summary
8.6 Terms and Concepts
8.7 To Learn More
8.8 Exercises
Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security
9.1 Protecting Programs and Data
9.2 Information and the Law
9.3 Rights of Employees and Employers
9.4 Software Failures
9.5 Computer Crime
9.6 Privacy
9.7 Ethical Issues in Computer Security
9.8 Case Studies of Ethics
9.9 Terms and Concepts
9.10 To Learn More
9.11 Exercises
Chapter 10. Cryptography Explained
10.1 Mathematics for Cryptography
10.2 Symmetric Encryption
10.3 Public Key Encryption Systems
10.4 Quantum Cryptography
10.5 Summary of Encryption
10.6 Terms and Concepts
10.7 Where the Field Is Headed
10.8 To Learn More
10.9 Exercises
Bibliography
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2002
Pages: 129
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Optimizing: Reducing Parses
Other Tips
Data Dictionary Report
Appendix B Functions
Java for RPG Programmers, 2nd Edition
String Manipulation
User Interface
Appendix A Using Java on the AS/400
Appendix B Mixing RPG And Java
Appendix C Obtaining The Code Samples
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Command-Line SQL*Plus
Using Substitution Variables
Extracting the Data
Indexes
The Master Key
FileMaker 8 Functions and Scripts Desk Reference
DayName()
Get(FileMakerPath)
IsValidExpression()
ScriptIDs()
TextFormatRemove()
Python Programming for the Absolute Beginner, 3rd Edition
Copying Directory Trees
Deleting Directory Trees
Other Client-Side Tools
PyErrata Database Interfaces
PyForm: A Persistent Object Viewer
Digital Character Animation 3 (No. 3)
Creating Characters
Animating the Face
Chapter Eight. Animal Motion
Chapter Nine. Acting
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies