Pfleeger, Charles P., 1948-

Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger. - 3rd ed. - Upper Saddle River, N.J. : Prentice Hall PTR ; 2003. - xxix, 746 p. : ill. ; 24 cm.

CONTENT
Chapter 1 Is there a security problem in computing
What does ''secure'' mean?
Attack
The meaning of computer security
Computer criminals
Methods of defense
etc

Chapter 2 Elementary Cryptography
Terminology and background
Substitution Ciphers
Transpositions (Permutations)
Making 'Good' Encryption
The data encryption standards (DES)
etc

Chapter 3 Program Security
Secure program
Non-malicious program errors
Virus and other malicious error
Targeted malicious code
Control against program threats
etc

Chapter 4 Protection in general-purpose operating systems
Protected object and method of operation
Memory and address protection
Control of access to general objects
File protection mechanism
User authentication
etc

Chapter 5 Designing treated operating systems
What is a trusted systems
Security policy
Models of security
Trusted operating system design
Implementation examples

Chapter 6 Database security
Introduction to database
Security requirements
Reliability and integrity
Sensitive data
Inferences
etc

Chapter 7 Security networks
Network concepts
Threats in networks
Network security control
Fire walls
Intrusion detection systems
etc

Chapter 8 Administering security
Security planning
Risk analysis
Organization security policies
Physical security
etc

Chapter 9 Legal, privacy and ethical issues in computer security
Protecting programs and data
Information and the law
Rights of employees and employers
Software failure
Computer crime
etc

Chapter 10 Cryptography explained
Mathematics for Cryptography
Symmetric encryption
Public key encryption systems
Quantum cryptography
Summary of encryption
etc





Includes bibliographical references (p. 691-725) and index.

0130355488 9780130355485

2002034368


Computer security.
Data protection.
Privacy, Right of.

005.8 / PPF