Security in Computing (inbunden)
Fler böcker inom
Inbunden (Hardback)
Antal sidor
Prentice Hall
Pfleeger, Shari Lawrence / Margulies, Jonathan
228 x 177 x 25 mm
1360 g
Antal komponenter
Security in Computing (inbunden)

Security in Computing

Inbunden Engelska, 2015-01-26
Skickas inom 5-8 vardagar.
Fri frakt inom Sverige för privatpersoner.
Finns även som
Visa alla 1 format & utgåvor
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare


Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect todays newest technologies, attacks, standards, and trends.


Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.


Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.


Youll start by mastering the fields basic terms, principles, and concepts. Next, youll apply these basics in diverse situations and environments, learning to think like an attacker and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, youll go beyond technology to understand crucial management issues in protecting infrastructure and data.


New coverage includes

  • A full chapter on securing cloud environments and managing their unique risks
  • Extensive new coverage of security issues associated with userweb interaction
  • New risks and techniques for safeguarding the Internet of Things
  • A new primer on threats to privacy and how to guard it
  • An assessment of computers and cyberwarfarerecent attacks and emerging risks
  • Security flaws and risks associated with electronic voting systems
Visa hela texten

Passar bra ihop

  1. Security in Computing
  2. +
  3. Analyzing Computer Security: A Threat / Vulnerability / Countmeasure Approach

De som köpt den här boken har ofta också köpt Analyzing Computer Security: A Threat / Vulnera... av Charles P Pfleeger, Shari Lawrence Pfleeger (inbunden).

Köp båda 2 för 2588 kr


Har du läst boken? Sätt ditt betyg »

Fler böcker av Charles P Pfleeger

Bloggat om Security in Computing

Övrig information

Charles Pfleeger is an internationally known expert on computer and communications security. He was originally a professor at the University of Tennessee, leaving there to join computer security research and consulting companies Trusted Information Systems and Arca Systems (later Exodus Communications and Cable and Wireless). With Trusted Information Systems he was Director of European Operations and Senior Consultant. With Cable and Wireless he was Director of Research and a member of the staff of the Chief Security Officer. He was chair of the IEEE Computer Society Technical Committee on Security and Privacy. Shari Lawrence Pfleeger is widely known as a software engineering and computer security researcher, most recently as a Senior Computer Scientist with the Rand Corporation and as Research Director of the Institute for Information Infrastructure Protection. She is currently Editor in Chief of IEEE Security & Privacy magazine. Jonathan Margulies is the CTO of Qmulos, a cybersecurity consulting firm. After receiving his Masters Degree in Computer Science from Cornell University, Mr. Margulies spent nine years at Sandia National Labs, researching and developing solutions to protect national security and critical infrastructure systems from advanced persistent threats. He then went on to NIST's National Cybersecurity Center of Excellence, where he worked with a variety of critical infrastructure companies to create industry-standard security architectures. In his free time, Mr. Margulies edits the "Building Security In" section of IEEE Security & Privacy magazine.


Foreword   xix

Preface   xxv

Acknowledgments    xxxi

About the Authors    xxxiii


Chapter 1: Introduction   1

1.1 What Is Computer Security?   2

1.2 Threats   6

1.3 Harm   21

1.4 Vulnerabilities   28

1.5 Controls   28

1.6 Conclusion   31

1.7 Whats Next?   32

1.8 Exercises   34


Chapter 2: Toolbox: Authentication, Access Control, and Cryptography   36

2.1 Authentication   38

2.2 Access Control   72

2.3 Cryptography   86

2.4 Exercises   127


Chapter 3: Programs and Programming   131

3.1 Unintentional (Nonmalicious) Programming Oversights   133

3.2 Malicious CodeMalware   166

3.3 Countermeasures   196


Chapter 4: The WebUser Side   232

4.1 Browser Attacks   234

4.2 Web Attacks Targeting Users   245

4.3 Obtaining User or Website Data   260

4.4 Email Attacks   267

4.5 Conclusion   277

4.6 Exercises   278


Chapter 5: Operating Systems    280

5.1 Security in Operating Systems   280

5.2 Security in the Design of Operating Systems   308

5.3 Rootkit   329

5.4 Conclusion   338

5.5 Exercises   339


Chapter 6: Networks   341

6.1 Network Concepts  342

Part IWar on Networks: Network Security Attacks   353

6.2 Threats to Network Communications   354

6.3 Wireless Network Security   374

6.4 Denial of Service   396

6.5 Distributed Denial-of-Service   421

Part IIStrategic Defenses: Security Countermeasures   432

6.6 Cryptography in Network Security   432

6.7 Firewalls   451

6.8 Intrusion Detection and Prevention Systems   474

6.9 Network Management 489

6.10 Conclusion   496

6.11 Exercises   496


Chapter 7: Databases 501

7.1 Introduction to Databases   502

7.2 Security Requirements of Databases   507

7.3 Reliability and Integrity   513

7.4 Database Disclosure   518

7.5 Data Mining and Big Data   535

7.6 Conclusion   549


Chapter 8: Cloud Computing   551

8.1 Cloud Computing Concepts   551

8.2 Moving to the Cloud   553

8.3 Cloud Se...