Flylib.com
Security in Computing, 4th Edition
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Security in Computing, Fourth Edition
Table of Contents
Copyright
Foreword
Preface
Chapter 1. Is There a Security Problem in Computing?
Section 1.1. What Does Secure Mean?
Section 1.2. Attacks
Section 1.3. The Meaning of Computer Security
Section 1.4. Computer Criminals
Section 1.5. Methods of Defense
Section 1.6. What s Next
Section 1.7. Summary
Section 1.8. Terms and Concepts
Section 1.9. Where the Field Is Headed
Section 1.10. To Learn More
Section 1.11. Exercises
Chapter 2. Elementary Cryptography
Section 2.1. Terminology and Background
Section 2.2. Substitution Ciphers
Section 2.3. Transpositions (Permutations)
Section 2.4. Making Good Encryption Algorithms
Section 2.5. The Data Encryption Standard
Section 2.6. The AES Encryption Algorithm
Section 2.7. Public Key Encryption
Section 2.8. The Uses of Encryption
Section 2.9. Summary of Encryption
Section 2.10. Terms and Concepts
Section 2.11. Where the Field Is Headed
Section 2.12. To Learn More
Section 2.13. Exercises
Chapter 3. Program Security
Section 3.1. Secure Programs
Section 3.2. Nonmalicious Program Errors
Section 3.3. Viruses and Other Malicious Code
Section 3.4. Targeted Malicious Code
Section 3.5. Controls Against Program Threats
Section 3.6. Summary of Program Threats and Controls
Section 3.7. Terms and Concepts
Section 3.8. Where the Field Is Headed
Section 3.9. To Learn More
Section 3.10. Exercises
Chapter 4. Protection in General-Purpose Operating Systems
Section 4.1. Protected Objects and Methods of Protection
Section 4.2. Memory and Address Protection
Section 4.3. Control of Access to General Objects
Section 4.4. File Protection Mechanisms
Section 4.5. User Authentication
Section 4.6. Summary of Security for Users
Section 4.7. Terms and Concepts
Section 4.8. Where the Field Is Headed
Section 4.9. To Learn More
Section 4.10. Exercises
Chapter 5. Designing Trusted Operating Systems
Section 5.1. What Is a Trusted System?
Section 5.2. Security Policies
Section 5.3. Models of Security
Section 5.4. Trusted Operating System Design
Section 5.5. Assurance in Trusted Operating Systems
Section 5.6. Summary of Security in Operating Systems
Section 5.7. Terms and Concepts
Section 5.8. Where the Field Is Headed
Section 5.9. To Learn More
Section 5.10. Exercises
Chapter 6. Database and Data Mining Security
Section 6.1. Introduction to Databases
Section 6.2. Security Requirements
Section 6.3. Reliability and Integrity
Section 6.4. Sensitive Data
Section 6.5. Inference
Section 6.6. Multilevel Databases
Section 6.7. Proposals for Multilevel Security
Section 6.8. Data Mining
Section 6.9. Summary of Database Security
Section 6.10. Terms and Concepts
Section 6.11. Where the Field Is Headed
Section 6.12. To Learn More
Section 6.13. Exercises
Chapter 7. Security in Networks
Section 7.1. Network Concepts
Section 7.2. Threats in Networks
Section 7.3. Network Security Controls
Section 7.4. Firewalls
Section 7.5. Intrusion Detection Systems
Section 7.6. Secure E-Mail
Section 7.7. Summary of Network Security
Section 7.8. Terms and Concepts
Section 7.9. Where the Field Is Headed
Section 7.10. To Learn More
Section 7.11. Exercises
Chapter 8. Administering Security
Section 8.1. Security Planning
Section 8.2. Risk Analysis
Section 8.3. Organizational Security Policies
Section 8.4. Physical Security
Section 8.5. Summary
Section 8.6. Terms and Concepts
Section 8.7. To Learn More
Section 8.8. Exercises
Chapter 9. The Economics of Cybersecurity
Section 9.1. Making a Business Case
Section 9.2. Quantifying Security
Section 9.3. Modeling Cybersecurity
Section 9.4. Current Research and Future Directions
Section 9.5. Summary
Section 9.6. Terms and Concepts
Section 9.7. To Learn More
Section 9.8. Exercises
Chapter 10. Privacy in Computing
Section 10.1. Privacy Concepts
Section 10.2. Privacy Principles and Policies
Section 10.3. Authentication and Privacy
Section 10.4. Data Mining
Section 10.5. Privacy on the Web
Section 10.6. E-Mail Security
Section 10.7. Impacts on Emerging Technologies
Section 10.8. Summary
Section 10.9. Terms and Concepts
Section 10.10. Where the Field Is Headed
Section 10.11. To Learn More
Section 10.12. Exercises
Chapter 11. Legal and Ethical Issues in Computer Security
Section 11.1. Protecting Programs and Data
Section 11.2. Information and the Law
Section 11.3. Rights of Employees and Employers
Section 11.4. Redress for Software Failures
Section 11.5. Computer Crime
Section 11.6. Ethical Issues in Computer Security
Section 11.7. Case Studies of Ethics
Section 11.8. Terms and Concepts
Section 11.9. To Learn More
Section 11.10. Exercises
Chapter 12. Cryptography Explained
Section 12.1. Mathematics for Cryptography
Section 12.2. Symmetric Encryption
Section 12.3. Public Key Encryption Systems
Section 12.4. Quantum Cryptography
Section 12.5. Summary of Encryption
Section 12.6. Terms and Concepts
Section 12.7. Where the Field Is Headed
Section 12.8. To Learn More
Section 12.9. Exercises
Bibliography
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Page #170 (Index)
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171
Authors:
Charles P. Pfleeger
,
Shari Lawrence Pfleeger
BUY ON AMAZON
Qshell for iSeries
Command-Line Arguments
Writing Programs for Qshell
The Perl Utility
C and C++ Development Tools
Appendix C Qshell and CL Commands for the IFS
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Identifying Project Resource Risk
Quantifying and Analyzing Project Risk
Managing Project Risk
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Command-Line Completion
Basic Router Configuration
System Banners
Virtual Terminals (VTYs)
IOS on Switches
The Complete Cisco VPN Configuration Guide
Routing on the Concentrator
Summary
Summary
Router ISAKMP/IKE Phase 1 Connectivity
IPsec Remote Access and L2L Sessions on the Same Router
.NET-A Complete Development Cycle
References for Further Reading
Unit Tests
GDI+ Programming
Conclusion
References for Further Reading
Comparing, Designing, and Deploying VPNs
Review Questions
IPsec: A Security Architecture for IP
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies