Introduction to Computer and Network Security

Book description

Combining hands-on work with an overview of fundamentals, this text integrates security analysis into a technical computing curriculum. It educates students on security issues, such as side-channel attacks, and deepens their understanding of how computers and networks work. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Classroom-tested case study projects prompt students to stage exploits and choose countermeasures to neutralize the attacks.

Table of contents

  1. Front Cover
  2. Dedication
  3. Contents (1/2)
  4. Contents (2/2)
  5. List of Figures
  6. List of Tables
  7. Foreword
  8. About the Author
  9. Acknowledgments
  10. Preface
  11. 1. Brief History of Computers, Communications, and Security (1/5)
  12. 1. Brief History of Computers, Communications, and Security (2/5)
  13. 1. Brief History of Computers, Communications, and Security (3/5)
  14. 1. Brief History of Computers, Communications, and Security (4/5)
  15. 1. Brief History of Computers, Communications, and Security (5/5)
  16. 2. Security and Privacy Overview (1/10)
  17. 2. Security and Privacy Overview (2/10)
  18. 2. Security and Privacy Overview (3/10)
  19. 2. Security and Privacy Overview (4/10)
  20. 2. Security and Privacy Overview (5/10)
  21. 2. Security and Privacy Overview (6/10)
  22. 2. Security and Privacy Overview (7/10)
  23. 2. Security and Privacy Overview (8/10)
  24. 2. Security and Privacy Overview (9/10)
  25. 2. Security and Privacy Overview (10/10)
  26. 3. Cryptography Primer (1/6)
  27. 3. Cryptography Primer (2/6)
  28. 3. Cryptography Primer (3/6)
  29. 3. Cryptography Primer (4/6)
  30. 3. Cryptography Primer (5/6)
  31. 3. Cryptography Primer (6/6)
  32. 4. SSL/TLS – Case Study Project (1/5)
  33. 4. SSL/TLS – Case Study Project (2/5)
  34. 4. SSL/TLS – Case Study Project (3/5)
  35. 4. SSL/TLS – Case Study Project (4/5)
  36. 4. SSL/TLS – Case Study Project (5/5)
  37. 5. Securing Networks (1/4)
  38. 5. Securing Networks (2/4)
  39. 5. Securing Networks (3/4)
  40. 5. Securing Networks (4/4)
  41. 6. Virtual Private Network – Case Study Project (1/3)
  42. 6. Virtual Private Network – Case Study Project (2/3)
  43. 6. Virtual Private Network – Case Study Project (3/3)
  44. 7. Insertion Attacks (1/4)
  45. 7. Insertion Attacks (2/4)
  46. 7. Insertion Attacks (3/4)
  47. 7. Insertion Attacks (4/4)
  48. 8. Buffer Overflow – Case Study Project (1/5)
  49. 8. Buffer Overflow – Case Study Project (2/5)
  50. 8. Buffer Overflow – Case Study Project (3/5)
  51. 8. Buffer Overflow – Case Study Project (4/5)
  52. 8. Buffer Overflow – Case Study Project (5/5)
  53. 9. Polymorphic Virus – Advanced Case Study Project (1/3)
  54. 9. Polymorphic Virus – Advanced Case Study Project (2/3)
  55. 9. Polymorphic Virus – Advanced Case Study Project (3/3)
  56. 10. Web Security (1/2)
  57. 10. Web Security (2/2)
  58. 11. Privacy and Anonymity (1/3)
  59. 11. Privacy and Anonymity (2/3)
  60. 11. Privacy and Anonymity (3/3)
  61. 12. Side-Channel Attacks (1/2)
  62. 12. Side-Channel Attacks (2/2)
  63. 13. Digital Rights Management and Copyright (1/2)
  64. 13. Digital Rights Management and Copyright (2/2)
  65. 14. Security Economics (1/2)
  66. 14. Security Economics (2/2)
  67. 15. Conclusions
  68. Bibliography (1/8)
  69. Bibliography (2/8)
  70. Bibliography (3/8)
  71. Bibliography (4/8)
  72. Bibliography (5/8)
  73. Bibliography (6/8)
  74. Bibliography (7/8)
  75. Bibliography (8/8)

Product information

  • Title: Introduction to Computer and Network Security
  • Author(s): Richard R. Brooks
  • Release date: August 2013
  • Publisher(s): Chapman and Hall/CRC
  • ISBN: 9781482214123