Book description
The classic guide to information security—fully updated for the latest attacks and countermeasures
Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them.
Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more
Security in Internet-based, distributed, desktop and traditional centralized applications
New attacks, including scripted vulnerability probing, denial of service, and buffer overflows—with symptoms and cures
Clear, accessible introduction to cryptography—without sophisticated math
Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography
Thoroughly revamped coverage of software engineering practices designed to enhance program security
Expanded coverage of risk management, contingency planning, and security policies
Detailed presentation of protection in general-purpose and trusted operating systems
Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references
Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security.
The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
Table of contents
- Copyright
- About Prentice Hall Professional Technical Reference
- Foreword
- Preface to the Third Edition
- Is There a Security Problem in Computing?
-
Elementary Cryptography
- Terminology and Background
- Substitution Ciphers
- Transpositions (Permutations)
- Making “Good” Encryption Algorithms
- The Data Encryption Standard (DES)
- The AES Encryption Algorithm
- Public Key Encryption
- The Uses of Encryption
- Summary of Encryption
- Terms and Concepts
- Where the Field Is Headed
- To Learn More
- Exercises
- Program Security
- Protection in General-Purpose Operating Systems
- Designing Trusted Operating Systems
- Database Security
- Security in Networks
- Administering Security
- Legal, Privacy, and Ethical Issues in Computer Security
- Cryptography Explained
- Bibliography
Product information
- Title: Security in Computing, Third Edition
- Author(s):
- Release date: December 2002
- Publisher(s): Pearson
- ISBN: 9780130355485
You might also like
book
Security in Computing
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of …
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …
book
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition, 5th Edition
Fully updated computer security essentials—quality approved by CompTIA Learn IT security fundamentals while getting complete coverage …
book
Fundamentals of Information Systems Security, 3rd Edition
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third …