Security in computing /
Charles P. Pfleeger, Shari Lawrence Pfleeger.
- 3rd ed.
- Upper Saddle River, N.J. : Prentice Hall PTR ; 2003.
- xxix, 746 p. : ill. ; 24 cm.
CONTENT Chapter 1 Is there a security problem in computing What does ''secure'' mean? Attack The meaning of computer security Computer criminals Methods of defense etc
Chapter 2 Elementary Cryptography Terminology and background Substitution Ciphers Transpositions (Permutations) Making 'Good' Encryption The data encryption standards (DES) etc
Chapter 3 Program Security Secure program Non-malicious program errors Virus and other malicious error Targeted malicious code Control against program threats etc
Chapter 4 Protection in general-purpose operating systems Protected object and method of operation Memory and address protection Control of access to general objects File protection mechanism User authentication etc
Chapter 5 Designing treated operating systems What is a trusted systems Security policy Models of security Trusted operating system design Implementation examples
Chapter 6 Database security Introduction to database Security requirements Reliability and integrity Sensitive data Inferences etc
Chapter 7 Security networks Network concepts Threats in networks Network security control Fire walls Intrusion detection systems etc
Chapter 9 Legal, privacy and ethical issues in computer security Protecting programs and data Information and the law Rights of employees and employers Software failure Computer crime etc
Chapter 10 Cryptography explained Mathematics for Cryptography Symmetric encryption Public key encryption systems Quantum cryptography Summary of encryption etc
Includes bibliographical references (p. 691-725) and index.
0130355488 9780130355485
2002034368
Computer security. Data protection. Privacy, Right of.