rozwiń
rozwiń
zwiń
zwiń
wpisz minimum 3 znaki
Computer Security: Principles and Practices
ocena: 6, głosów: 5
 
powiększenie

Fragmenty

przeczytaj fragment książki
Computer Security: Principles and Practices

Spis treści:
Online Resources xiii Notation xiv About the Authors xv Preface xvii Chapter 0 Reader's and Instructor's Guide 1 0.1 Outline of This Book 2 0.2 A Roadmap for Readers and Instructors 2 0.3 Support for CISSP Certification 3 0.4 Internet and Web Resources 5 0.5 Standards 7 Chapter 1 Overview 9 1.1 Computer Security Concepts 10 1.2 Threats, Attacks, and Assets 18 1.3 Security Functional Requirements 23 1.4 A Security Architecture for Open Systems 26 1.5 Computer Security Trends 31 1.6 Computer Security Strategy 33 1.7 Recommended Reading and Web Sites 35 1.8 Key Terms, Review Questions, and Problems 36 PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38 Chapter 2 Cryptographic Tools 38 2.1 Confidentiality with Symmetric Encryption 39 2.2 Message Authentication and Hash Functions 46 2.3 Public-Key Encryption 54 2.4 Digital Signatures and Key Management 59 2.5 Random and Pseudorandom Numbers 62 2.6 Practical Application: Encryption of Stored Data 64 2.7 Recommended Reading and Web Sites 66 2.8 Key Terms, Review Questions, and Problems 67 Chapter 3 User Authentication 71 3.1 Means of Authentication 73 3.2 Password-Based Authentication 73 3.3 Token-Based Authentication 84 3.4 Biometric Authentication 88 3.5 Remote User Authentication 93 3.6 Security Issues for User Authentication 95 3.7 Practical Application: An Iris Biometric System 97 3.8 Case Study: Security Problems for ATM Systems 99 3.9 Recommended Reading and Web Sites 101 3.10 Key Terms, Review Questions, and Problems 103 Chapter 4 Access Control 105 4.1 Access Control Principles 106 4.2 Subjects, Objects, and Access Rights 110 4.3 Discretionary Access Control 111 4.4 Example: UNIX File Access Control 118 4.5 Role-Based Access Control 121 4.6 Case Study: RBAC System for a Bank 129 4.7 Recommended Reading and Web Site 132 4.8 Key Terms, Review Questions, and Problems 133 Chapter 5 Database Security 137 5.1 The Need for Database Security 138 5.2 Database Management Systems 139 5.3 Relational Databases 141 5.4 Database Access Control 144 5.5 Inference 149 5.6 Statistical Databases 152 5.7 Database Encryption 162 5.8 Cloud Security 166 5.9 Recommended Reading and Web Site 172 5.10 Key Terms, Review Questions, and Problems 173 Chapter 6 Malicious Software 178 6.1 Types of Malicious Software (Malware) 179 6.2 Propagation Infected Content Viruses 182 6.3 Propagation Vulnerability Exploit Worms 188 6.4 Propagation Social Engineering SPAM E-mail, Trojans 195 6.5 Payload System Corruption 197 6.6 Payload Attack Agent Zombie, Bots 199 6.7 Payload Information Theft Keyloggers, Phishing, Spyware 201 6.8 Payload Stealthing Backdoors, Rootkits 202 6.9 Countermeasures 206 6.10 Recommended Reading and Web Sites 215 6.11 Key Terms, Review Questions, and Problems 216 Chapter 7 Denial-of-Service Attacks 220 7.1 Denial-of-Service Attacks 221 7.2 Flooding Attacks 228 7.3 Distributed Denial-of-Service Attacks 230 7.4 Application-Based Bandwidth Attacks 232 7.5 Reflector and Amplifier Attacks 234 7.6 Defenses Against Denial-of-Service Attacks 239 7.7 Responding to a Denial-of-Service Attack 243 7.8 Recommended Reading and Web Sites 244 7.9 Key Terms, Review Questions, and Problems 245 Chapter 8 Intrusion Detection 248 8.1 Intruders 249 8.2 Intrusion Detection 253 8.3 Host-Based Intrusion Detection 256 8.4 Distributed Host-Based Intrusion Detection 263 8.5 Network-Based Intrusion Detection 265 8.6 Distributed Adaptive Intrusion Detection 270 8.7 Intrusion Detection Exchange Format 273 8.8 Honeypots 275 8.9 Example System: Snort 277 8.10 Recommended Reading and Web Sites 281 8.11 Key Terms, Review Questions, and Problems 282 Chapter 9 Firewalls and Intrusion Prevention Systems 285 9.1 The Need for Firewalls 286 9.2 Firewall Characteristics 287 9.3 Types of Firewalls 288 9.4 Firewall Basing 296 9.5 Firewall Location and Configurations 298 9.6 Intrusion Prevention Systems 303 9.7 Example: Unified Threat Management Products 306 9.8 Recommended Reading and Web Site 310 9.9 Key Terms, Review Questions, and Problems 311 PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS 316 Chapter 10 Buffer Overflow 316 10.1 Stack Overflows 318 10.2 Defending Against Buffer Overflows 339 10.3 Other Forms of Overflow Attacks 345 10.4 Recommended Reading and Web Sites 352 10.5 Key Terms, Review Questions, and Problems 353 Chapter 11 Software Security 355 11.1 Software Security Issues 356 11.2 Handling Program Input 360 11.3 Writing Safe Program Code 371 11.4 Interacting with the Operating System and Other Programs 376 11.5 Handling Program Output 389 11.6 Recommended Reading and Web Sites 391 11.7 Key Terms, Review Questions, and Problems 392 Chapter 12 Operating System Security 396 12.1 Introduction to Operating System Security 398 12.2 System Security Planning 399 12.3 Operating Systems Hardening 399 12.4 Application Security 404 12.5 Security Maintenance 405 12.6 Linux/Unix Security 406 12.7 Windows Security 410 12.8 Virtualization Security 412 12.9 Recommended Reading and Web Sites 416 12.10 Key Terms, Review Questions, and Problems 417 Chapter 13 Trusted Computing and Multilevel Security 420 13.1 The Bell-LaPadula Model for Computer Security 421 13.2 Other Formal Models for Computer Security 431 13.3 The Concept of Trusted Systems 437 13.4 Application of Multilevel Security 440 13.5 Trusted Computing and the Trusted Platform Module 447 13.6 Common Criteria for Information Technology Security Evaluation 451 13.7 Assurance and Evaluation 457 13.8 Recommended Reading and Web Sites 462 13.9 Key Terms, Review Questions, and Problems 463 PART THREE: MANAGEMENT ISSUES 466 Chapter 14 IT Security Management and Risk Assessment 466 14.1 IT Security Management 467 14.2 Organizational Context and Security Policy 470 14.3 Security Risk Assessment 473 14.4 Detailed Security Risk Analysis 476 14.5 Case Study: Silver Star Mines 488 14.6 Recommended Reading and Web Sites 493 14.7 Key Terms, Review Questions, and Problems 494 Chapter 15 IT Security Controls, Plans, and Procedures 497 15.1 IT Security Management Implementation 498 15.2 Security Controls or Safeguards 498 15.3 IT Security Plan 506 15.4 Implementation of Controls 507 15.5 Implementation Follow-up 508 15.6 Case Study: Silver Star Mines 511 15.7 Recommended Reading 514 15.8 Key Terms, Review Questions, and Problems 514 Chapter 16 Physical and Infrastructure Security 516 16.1 Overview 517 16.2 Physical Security Threats 518 16.3 Physical Security Prevention and Mitigation Measures 525 16.4 Recovery from Physical Security Breaches 528 16.5 Example: A Corporate Physical Security Policy 529 16.6 Integration of Physical and Logical Security 529 16.7 Recommended Reading and Web Sites 536 16.8 Key Terms, Review Questions, and Problems 537 Chapter 17 Human Resources Security 539 17.1 Security Awareness, Training, and Education 540 17.2 Employment Practices and Policies 546 17.3 E-Mail and Internet Use Policies 549 17.4 Computer Security Incident Response Teams 550 17.5 Recommended Reading and Web Sites 557 17.6 Key Terms, Review Questions, and Problems 558 Chapter 18 Security Auditing 560 18.1 Security Auditing Architecture 562 18.2 The Security Audit Trail 567 18.3 Implementing the Logging Function 571 18.4 Audit Trail Analysis 583 18.5 Example: An Integrated Approach 587

Computer Security: Principles and Practices (miękka)

lit. obcojęzyczna

Wydawnictwo: Pearson Education Limited

Oprawa: miękka

Ilość stron: 816

Dostępność: niedostępny

darmowa dostawa od 300zł Darmowa dostawa

Nasza cena: 402,57

Cena detaliczna: 447,30

U nas taniej o 10%

dodaj do przechowalni dodaj do listy życzeń
Powrót Darmowa wysyłka dla zamówień od 99zł. SPRAWDŹ!
  • Opis

  • Szczegółowe informacje

  • Recenzje (0)

Computer Security: Principles and Practices - opis produktu:

Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.

Computer Security: Principles and Practices - szczegółowe informacje:

Dział: Literatura obcojęzyczna
Wydawnictwo: Pearson Education Limited
Oprawa:miękka
Okładka:miękka
Ilość stron:816
ISBN:978-0-27-376449-6
Wprowadzono: 25.03.2013
i zgarniaj nagrody napisz recenzję

Computer Security: Principles and Practices - recenzje klientów


Podobał Ci się ten tytuł? Zainspirował Cię? A może nie zgadzasz sie z autorem, opowiedz nam o tym, opisz swoje doznania związane z lekturą.

Ciekawe pomysły Gandalfa

lit. obcojęzyczna

25.74 zł

taniej -9%

Computer Science Applied in Education

The authors of articles in this collection seek to answer the following questions: how to use and design appriopriate tools which facilitate research and axploration of the data obtained , among others, in the course of educational processes, as well as how to use the existing education support tools and how to design new ones to meet the needs of our times.

podręcznik

116.48 zł

taniej -15%

Teaching Lexically Principles and practice

Teaching Lexically shows what a lexical view of language looks like, and explores how it differs from a more traditional ?grammar + words? view. It then considers what implications such a view might have for classroom practice. At the heart of Teaching Lexically are three main ideas: Grammar and vocabulary are both taught better in combination....

podręcznik

98.81 zł

taniej -15%

The Business English Teacher Paperback...

DELTA TEACHER DEVELOPMENT SERIES Pionierska, wyróżniona licznymi nagrodami seria publikacji na nauczycieli języka angielskiego, zainteresowanych rozwojem zawodowym, wdrażaniem nowoczesnych rozwiązań edukacyjnych oraz praktycznymi poradami, dotyczącymi nauczania języka. Autorami serii Delta Teacher Development Series są najbardziej renomowani i uznani...

podręcznik

99.61 zł

taniej -15%

Digital Play Computer games and language aims

Delta Teacher Development Series A pioneering, multi-award-winning series of books for English Language Teachers with professional development in mind, blending theory, practice and development. The Delta Teacher Development Series features some of the best and most expert authors in ELT, writing about fundamental areas of professional interest to...

muzyka

101.43 zł

taniej -0%

Computer World (vinyl)

Niewątpliwie Kraftwerk jest symbolem muzyki elektronicznej, a ich największym przebojem nadal pozostaje The Model (lub Das Modell w wersji niemieckiej), wykorzystany później przez niemiecki, metalowy zespół Rammstein i noise'owy Big Black, który podbił listy przebojów całego świata. Innym znanym utworem był Der Taschenrechner, który grupa śpiewała w wersji...

muzyka

70.68 zł

taniej -4%

Computer World

Niewątpliwie Kraftwerk jest symbolem muzyki elektronicznej, a ich największym przebojem nadal pozostaje The Model (lub Das Modell w wersji niemieckiej), wykorzystany później przez niemiecki, metalowy zespół Rammstein i noise'owy Big Black, który podbił listy przebojów całego świata. Innym znanym utworem był Der Taschenrechner, który grupa śpiewała w wersji...

Brak list życzeń:

Utwórz

zamówienie tradycyjne
Brak produktów w koszyku
Brak produktów w koszyku

2.99

14.99

2.99

1.98

8.99

2.35

2.84

Łączna wartość zamówienia: 0 zł0 zł
Dostawa i płatność › Płatność › przejdź do koszyka
rozwiń
Wpisz numer
Swojego zamówienia (xxxxxx/rrrr)
Sprawdź

Powiadom kiedy produkt będzie dostępny

Wpisz swój adres e-mail: