Book description
The classic guide to information security—fully updated for the latest attacks and countermeasures
Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them.
Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more
Security in Internet-based, distributed, desktop and traditional centralized applications
New attacks, including scripted vulnerability probing, denial of service, and buffer overflows—with symptoms and cures
Clear, accessible introduction to cryptography—without sophisticated math
Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography
Thoroughly revamped coverage of software engineering practices designed to enhance program security
Expanded coverage of risk management, contingency planning, and security policies
Detailed presentation of protection in general-purpose and trusted operating systems
Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references
Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security.
The companion website (http://www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.
Table of contents
- Copyright
- About Prentice Hall Professional Technical Reference
- Foreword
- Preface to the Third Edition
- Is There a Security Problem in Computing?
-
Elementary Cryptography
- Terminology and Background
- Substitution Ciphers
- Transpositions (Permutations)
- Making “Good” Encryption Algorithms
- The Data Encryption Standard (DES)
- The AES Encryption Algorithm
- Public Key Encryption
- The Uses of Encryption
- Summary of Encryption
- Terms and Concepts
- Where the Field Is Headed
- To Learn More
- Exercises
- Program Security
- Protection in General-Purpose Operating Systems
- Designing Trusted Operating Systems
- Database Security
- Security in Networks
- Administering Security
- Legal, Privacy, and Ethical Issues in Computer Security
- Cryptography Explained
- Bibliography
Product information
- Title: Security in Computing, Third Edition
- Author(s):
- Release date: December 2002
- Publisher(s): Pearson
- ISBN: 9780130355485
You might also like
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
book
The Cyber Risk Handbook
Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …