Detaljer om varen
- 5. Udgave
- Vital Source searchable e-book (Reflowable pages)
- Udgiver: Pearson International (Januar 2015)
- Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
- ISBN: 9780134085050
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- 5. Udgave
- Vital Source 180 day rentals (dynamic pages)
- Udgiver: Pearson International (Januar 2015)
- Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
- ISBN: 9780134085050R180
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems
Licens varighed:
Bookshelf online: 180 dage fra købsdato.
Bookshelf appen: 180 dage fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- 5. Udgave
- Vital Source 90 day rentals (dynamic pages)
- Udgiver: Pearson International (Januar 2015)
- Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
- ISBN: 9780134085050R90
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems
Licens varighed:
Bookshelf online: 90 dage fra købsdato.
Bookshelf appen: 90 dage fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- 5. Udgave
- Vital Source 365 day rentals (dynamic pages)
- Udgiver: Pearson International (Januar 2015)
- Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
- ISBN: 9780134085050R365
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: 5 år fra købsdato.
Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
Detaljer om varen
- 5. Udgave
- Hardback: 944 sider
- Udgiver: Pearson Education (Januar 2015)
- Forfattere: Charles Pfleeger, Shari Pfleeger og Jonathan Margulies
- ISBN: 9780134085043
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on "Security in Computing" as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today s newest technologies, attacks, standards, and trends. " Security in Computing, Fifth Edition, " offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You ll start by mastering the field s basic terms, principles, and concepts. Next, you ll apply these basics in diverse situations and environments, learning to think like an attacker and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare recent attacks and emerging risks Security flaws and risks associated with electronic voting systems "
Foreword xix Preface xxv Acknowledgments xxxi About the Authors xxxiii
Chapter 1: Introduction 1
1.1 What Is Computer Security? 2
1.2 Threats 6
1.3 Harm 21
1.4 Vulnerabilities 28
1.5 Controls 28
1.6 Conclusion 31
1.7 What's Next? 32
1.8 Exercises 34
Chapter 2: Toolbox: Authentication, Access Control, and Cryptography 36
2.1 Authentication 38
2.2 Access Control 72
2.3 Cryptography 86
2.4 Exercises 127
Chapter 3: Programs and Programming 131
3.1 Unintentional (Nonmalicious) Programming Oversights 133
3.2 Malicious Code--Malware 166
3.3 Countermeasures 196
Chapter 4: The Web--User Side 232
4.1 Browser Attacks 234
4.2 Web Attacks Targeting Users 245
4.3 Obtaining User or Website Data 260
4.4 Email Attacks 267
4.5 Conclusion 277
4.6 Exercises 278
Chapter 5: Operating Systems 280
5.1 Security in Operating Systems 280
5.2 Security in the Design of Operating Systems 308
5.3 Rootkit 329
5.4 Conclusion 338
5.5 Exercises 339
Chapter 6: Networks 341
6.1 Network Concepts 342
Part I--War on Networks: Network Security Attacks 353
6.2 Threats to Network Communications 354
6.3 Wireless Network Security 374
6.4 Denial of Service 396
6.5 Distributed Denial-of-Service 421
Part II--Strategic Defenses: Security Countermeasures 432
6.6 Cryptography in Network Security 432
6.7 Firewalls 451
6.8 Intrusion Detection and Prevention Systems 474
6.9 Network Management 489
6.10 Conclusion 496
6.11 Exercises 496
Chapter 7: Databases 501
7.1 Introduction to Databases 502
7.2 Security Requirements of Databases 507
7.3 Reliability and Integrity 513
7.4 Database Disclosure 518
7.5 Data Mining and Big Data 535
7.6 Conclusion 549
Chapter 8: Cloud Computing 551
8.1 Cloud Computing Concepts 551
8.2 Moving to the Cloud 553
8.3 Cloud Security Tools and Techniques 560
8.4 Cloud Identity Management 568
8.5 Securing IaaS 579
8.6 Conclusion 583
8.7 Exercises 584
Chapter 9: Privacy 586
9.1 Privacy Concepts 587
9.2 Privacy Principles and Policies 596
9.3 Authentication and Privacy 610
9.4 Data Mining 616
9.5 Privacy on the Web 619
9.6 Email Security 632
9.7 Privacy Impacts of Emerging Technologies 636
9.8 Where the Field Is Headed 644
9.9 Conclusion 645
9.10 Exercises 645
Chapter 10: Management and Incidents 647
10.1 Security Planning 647
10.2 Business Continuity Planning 658
10.3 Handling Incidents 662
10.4 Risk Analysis 668
10.5 Dealing with Disaster 686
10.6 Conclusion 699
10.7 Exercises 700
Chapter 11: Legal Issues and Ethics 702
11.1 Protecting Programs and Data 704
11.2 Information and the Law 717
11.3 Rights of Employees and Employers 725
11.4 Redress for Software Failures 728
11.5 Computer Crime 733
11.6 Ethical Issues in Computer Security 744
11.7 Incident Analysis with Ethics 750
Chapter 12: Details of Cryptography 768
12.1 Cryptology 769
12.2 Symmetric Encryption Algorithms 779
12.3 Asymmetric Encryption with RSA 795
12.4 Message Digests 799
12.5 Digital Signatures 802
12.6 Quantum Cryptography 807
12.7 Conclusion 811
Chapter 13: Emerging Topics 813
13.1 The Internet of Things 814
13.2 Economics 821
13.3 Electronic Voting 834
13.4 Cyber Warfare 841
13.5 Conclusion 850 Bibliography 851 Index 877