- Format
- Häftad (Paperback)
- Språk
- Engelska
- Antal sidor
- 800
- Utgivningsdatum
- 2018-01-18
- Upplaga
- 4
- Förlag
- Pearson
- Medarbetare
- Brown, Lawrie
- Dimensioner
- 235 x 179 x 41 mm
- Vikt
- Antal komponenter
- 1
- Komponenter
- Paperback (1)
- ISBN
- 9781292220611
- 1480 g
Du kanske gillar
-
Halo Encyclopedia
Microsoft
InbundenComputer Security: Principles and Practice, Global Edition
784- Skickas inom 7-10 vardagar.
- Gratis frakt inom Sverige över 199 kr för privatpersoner.
Passar bra ihop
De som köpt den här boken har ofta också köpt Network Security Essentials: Applications and S... av William Stallings (häftad).
Köp båda 2 för 1493 krKundrecensioner
Har du läst boken? Sätt ditt betyg »Fler böcker av William Stallings
-
Operating Systems: Internals and Design Principles, Global Edition
William Stallings
-
Wireless Communications & Networks: Pearson New International Edition
William Stallings
-
Network Security Essentials: Applications and Standards, Global Edition
William Stallings
Innehållsförteckning
Online Resources
Preface
Notation
About the Authors
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 Threats, Attacks, and Assets
1.3 Security Functional Requirements
1.4 Fundamental Security Design Principles
1.5 Attack Surfaces and Attack Trees
1.6 Computer Security Strategy
1.7 Standards
1.8 Key Terms, Review Questions, and Problems
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
2.1 Confidentiality with Symmetric Encryption
2.2 Message Authentication and Hash Functions
2.3 Public-Key Encryption
2.4 Digital Signatures and Key Management
2.5 Random and Pseudorandom Numbers
2.6 Practical Application: Encryption of Stored Data
2.7 Key Terms, Review Questions, and Problems
Chapter 3 User Authentication
3.1 Digital User Authentication Principles
3.2 Password-Based Authentication
3.3 Token-Based Authentication
3.4 Biometric Authentication
3.5 Remote User Authentication
3.6 Security Issues for User Authentication
3.7 Practical Application: An Iris Biometric System
3.8 Case Study: Security Problems for ATM Systems
3.9 Key Terms, Review Questions, and Problems
Chapter 4 Access Control
4.1 Access Control Principles
4.2 Subjects, Objects, and Access Rights
4.3 Discretionary Access Control
4.4 Example: UNIX File Access Control
4.5 Role-Based Access Control
4.6 Attribute-Based Access Control
4.7 Identity, Credential, and Access Management
4.8 Trust Frameworks
4.9 Case Study: RBAC System for a Bank
4.10 Key Terms, Review Questions, and Problems
Chapter 5 Database and Data Center Security
5.1 The Need for Database Security
5.2 Database Management Systems
5.3 Relational Databases
5.4 SQL Injection Attacks
5.5 Database Access Control
5.6 Inference
5.7 Database Encryption
5.8 Data Center Security
5.9 Key Terms, Review Questions, and Problems
Chapter 6 Malicious Software
6.1 Types of Malicious Software
6.2 ...