Amazon cover image
Image from Amazon.com

Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

By: Contributor(s): Publication details: Upper Saddle River, N.J. : Prentice Hall PTR ; 2003.Edition: 3rd edDescription: xxix, 746 p. : ill. ; 24 cmISBN:
  • 0130355488
  • 9780130355485
Subject(s): DDC classification:
  • 005.8 22 PPF
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Open Access Book Open Access Engineering Library 005.8 PPF (Browse shelf(Opens below)) 1 Available BUML23112224

CONTENT
Chapter 1 Is there a security problem in computing
What does ''secure'' mean?
Attack
The meaning of computer security
Computer criminals
Methods of defense
etc

Chapter 2 Elementary Cryptography
Terminology and background
Substitution Ciphers
Transpositions (Permutations)
Making 'Good' Encryption
The data encryption standards (DES)
etc

Chapter 3 Program Security
Secure program
Non-malicious program errors
Virus and other malicious error
Targeted malicious code
Control against program threats
etc

Chapter 4 Protection in general-purpose operating systems
Protected object and method of operation
Memory and address protection
Control of access to general objects
File protection mechanism
User authentication
etc

Chapter 5 Designing treated operating systems
What is a trusted systems
Security policy
Models of security
Trusted operating system design
Implementation examples

Chapter 6 Database security
Introduction to database
Security requirements
Reliability and integrity
Sensitive data
Inferences
etc

Chapter 7 Security networks
Network concepts
Threats in networks
Network security control
Fire walls
Intrusion detection systems
etc

Chapter 8 Administering security
Security planning
Risk analysis
Organization security policies
Physical security
etc

Chapter 9 Legal, privacy and ethical issues in computer security
Protecting programs and data
Information and the law
Rights of employees and employers
Software failure
Computer crime
etc

Chapter 10 Cryptography explained
Mathematics for Cryptography
Symmetric encryption
Public key encryption systems
Quantum cryptography
Summary of encryption
etc



Includes bibliographical references (p. 691-725) and index.

There are no comments on this title.

to post a comment.