Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Fourth Edition
Table of Contents
Copyright
Foreword
Preface
Chapter 1. Is There a Security Problem in Computing?
Section 1.1. What Does Secure Mean?
Section 1.2. Attacks
Section 1.3. The Meaning of Computer Security
Section 1.4. Computer Criminals
Section 1.5. Methods of Defense
Section 1.6. What s Next
Section 1.7. Summary
Section 1.8. Terms and Concepts
Section 1.9. Where the Field Is Headed
Section 1.10. To Learn More
Section 1.11. Exercises
Chapter 2. Elementary Cryptography
Section 2.1. Terminology and Background
Section 2.2. Substitution Ciphers
Section 2.3. Transpositions (Permutations)
Section 2.4. Making Good Encryption Algorithms
Section 2.5. The Data Encryption Standard
Section 2.6. The AES Encryption Algorithm
Section 2.7. Public Key Encryption
Section 2.8. The Uses of Encryption
Section 2.9. Summary of Encryption
Section 2.10. Terms and Concepts
Section 2.11. Where the Field Is Headed
Section 2.12. To Learn More
Section 2.13. Exercises
Chapter 3. Program Security
Section 3.1. Secure Programs
Section 3.2. Nonmalicious Program Errors
Section 3.3. Viruses and Other Malicious Code
Section 3.4. Targeted Malicious Code
Section 3.5. Controls Against Program Threats
Section 3.6. Summary of Program Threats and Controls
Section 3.7. Terms and Concepts
Section 3.8. Where the Field Is Headed
Section 3.9. To Learn More
Section 3.10. Exercises
Chapter 4. Protection in General-Purpose Operating Systems
Section 4.1. Protected Objects and Methods of Protection
Section 4.2. Memory and Address Protection
Section 4.3. Control of Access to General Objects
Section 4.4. File Protection Mechanisms
Section 4.5. User Authentication
Section 4.6. Summary of Security for Users
Section 4.7. Terms and Concepts
Section 4.8. Where the Field Is Headed
Section 4.9. To Learn More
Section 4.10. Exercises
Chapter 5. Designing Trusted Operating Systems
Section 5.1. What Is a Trusted System?
Section 5.2. Security Policies
Section 5.3. Models of Security
Section 5.4. Trusted Operating System Design
Section 5.5. Assurance in Trusted Operating Systems
Section 5.6. Summary of Security in Operating Systems
Section 5.7. Terms and Concepts
Section 5.8. Where the Field Is Headed
Section 5.9. To Learn More
Section 5.10. Exercises
Chapter 6. Database and Data Mining Security
Section 6.1. Introduction to Databases
Section 6.2. Security Requirements
Section 6.3. Reliability and Integrity
Section 6.4. Sensitive Data
Section 6.5. Inference
Section 6.6. Multilevel Databases
Section 6.7. Proposals for Multilevel Security
Section 6.8. Data Mining
Section 6.9. Summary of Database Security
Section 6.10. Terms and Concepts
Section 6.11. Where the Field Is Headed
Section 6.12. To Learn More
Section 6.13. Exercises
Chapter 7. Security in Networks
Section 7.1. Network Concepts
Section 7.2. Threats in Networks
Section 7.3. Network Security Controls
Section 7.4. Firewalls
Section 7.5. Intrusion Detection Systems
Section 7.6. Secure E-Mail
Section 7.7. Summary of Network Security
Section 7.8. Terms and Concepts
Section 7.9. Where the Field Is Headed
Section 7.10. To Learn More
Section 7.11. Exercises
Chapter 8. Administering Security
Section 8.1. Security Planning
Section 8.2. Risk Analysis
Section 8.3. Organizational Security Policies
Section 8.4. Physical Security
Section 8.5. Summary
Section 8.6. Terms and Concepts
Section 8.7. To Learn More
Section 8.8. Exercises
Chapter 9. The Economics of Cybersecurity
Section 9.1. Making a Business Case
Section 9.2. Quantifying Security
Section 9.3. Modeling Cybersecurity
Section 9.4. Current Research and Future Directions
Section 9.5. Summary
Section 9.6. Terms and Concepts
Section 9.7. To Learn More
Section 9.8. Exercises
Chapter 10. Privacy in Computing
Section 10.1. Privacy Concepts
Section 10.2. Privacy Principles and Policies
Section 10.3. Authentication and Privacy
Section 10.4. Data Mining
Section 10.5. Privacy on the Web
Section 10.6. E-Mail Security
Section 10.7. Impacts on Emerging Technologies
Section 10.8. Summary
Section 10.9. Terms and Concepts
Section 10.10. Where the Field Is Headed
Section 10.11. To Learn More
Section 10.12. Exercises
Chapter 11. Legal and Ethical Issues in Computer Security
Section 11.1. Protecting Programs and Data
Section 11.2. Information and the Law
Section 11.3. Rights of Employees and Employers
Section 11.4. Redress for Software Failures
Section 11.5. Computer Crime
Section 11.6. Ethical Issues in Computer Security
Section 11.7. Case Studies of Ethics
Section 11.8. Terms and Concepts
Section 11.9. To Learn More
Section 11.10. Exercises
Chapter 12. Cryptography Explained
Section 12.1. Mathematics for Cryptography
Section 12.2. Symmetric Encryption
Section 12.3. Public Key Encryption Systems
Section 12.4. Quantum Cryptography
Section 12.5. Summary of Encryption
Section 12.6. Terms and Concepts
Section 12.7. Where the Field Is Headed
Section 12.8. To Learn More
Section 12.9. Exercises
Bibliography
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Page #170 (Index)
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
CISSP Exam Cram 2
Mastering the Inner Game
Fire Prevention, Detection, and Suppression
WANS and Their Components
Exam Prep Questions
Exam Prep Questions
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Creating an MP3 Player
Virtual Joystick
Not Quite a Magic Ball
Storing Ink in a Database
MySQL Clustering
Installing MySQL-Max
Retrieving the Latest Snapshot from BitKeeper
Auto-discovery of Databases
The Structure of config.ini
Backup and Recovery
Visual C# 2005 How to Program (2nd Edition)
Terminology
Summary
Summary
Creating a Sequential-Access Text File
Introduction
Microsoft VBScript Professional Projects
What Is VBScript?
Errors, Constants, and Variables
Procedures
Project Case Study Desktop Customization and Deployment
Customizing the Desktop
.NET-A Complete Development Cycle
Introducing .NET
Advanced GDI+ Extensions
Conclusion
Breakdown of the Code Modules
Putting It All Together
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies