Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.
Publication details: Upper Saddle River, N.J. : Prentice Hall PTR ; 2003.Edition: 3rd edDescription: xxix, 746 p. : ill. ; 24 cmISBN:- 0130355488
- 9780130355485
- 005.8 22 PPF
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 005.8 PPF (Browse shelf(Opens below)) | 1 | Available | BUML23112224 |
CONTENT
Chapter 1 Is there a security problem in computing
What does ''secure'' mean?
Attack
The meaning of computer security
Computer criminals
Methods of defense
etc
Chapter 2 Elementary Cryptography
Terminology and background
Substitution Ciphers
Transpositions (Permutations)
Making 'Good' Encryption
The data encryption standards (DES)
etc
Chapter 3 Program Security
Secure program
Non-malicious program errors
Virus and other malicious error
Targeted malicious code
Control against program threats
etc
Chapter 4 Protection in general-purpose operating systems
Protected object and method of operation
Memory and address protection
Control of access to general objects
File protection mechanism
User authentication
etc
Chapter 5 Designing treated operating systems
What is a trusted systems
Security policy
Models of security
Trusted operating system design
Implementation examples
Chapter 6 Database security
Introduction to database
Security requirements
Reliability and integrity
Sensitive data
Inferences
etc
Chapter 7 Security networks
Network concepts
Threats in networks
Network security control
Fire walls
Intrusion detection systems
etc
Chapter 8 Administering security
Security planning
Risk analysis
Organization security policies
Physical security
etc
Chapter 9 Legal, privacy and ethical issues in computer security
Protecting programs and data
Information and the law
Rights of employees and employers
Software failure
Computer crime
etc
Chapter 10 Cryptography explained
Mathematics for Cryptography
Symmetric encryption
Public key encryption systems
Quantum cryptography
Summary of encryption
etc
Includes bibliographical references (p. 691-725) and index.
There are no comments on this title.