CONTENTS

PREFACE

ACKNOWLEDGMENTS

ABOUT THE EDITORS

ABOUT THE CONTRIBUTORS

A NOTE TO INSTRUCTORS

PART I FOUNDATIONS OF COMPUTER SECURITY

1. Brief History and Mission of Information System Security

Seymour Bosworth and Robert V. Jacobson

2. History of Computer Crime

M. E. Kabay

3. Toward a New Framework for Information Security

Donn B. Parker

4. Hardware Elements of Security

Seymour Bosworth and Stephen Cobb

5. Data Communications and Information Security

Raymond Panko

6. Network Topologies, Protocols, and Design

Gary C. Kessler and N. Todd Pritsky

7. Encryption

Stephen Cobb and Corinne Lefrançois

8. Using a Common Language for Computer Security Incident Information

John D. Howard

9. Mathematical Models of Computer Security

Matt Bishop

10. Understanding Studies and Surveys of Computer Crime

M. E. Kabay

11. Fundamentals of Intellectual Property Law

William A. Zucker and Scott J. Nathan

PART II THREATS AND VULNERABILITIES

12. The Psychology of Computer Criminals

Q. Campbell and David M. Kennedy

13. The Dangerous Information Technology Insider: Psychological Characteristics and Career Patterns

Jerrold M. Post

14. Information Warfare

Seymour Bosworth

15. Penetrating Computer Systems and Networks

Chey Cobb, Stephen Cobb, and M. E. Kabay

16. Malicious Code

Robert Guess and Eric Salveggio

17. Mobile Code

Robert Gezelter

18. Denial-of-Service Attacks

Gary C. Kessler and Diane E. Levine

19. Social Engineering and Low-Tech Attacks

Karthik Raman, Susan Baumes, Kevin Beets, and Carl Ness

20. ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.