Computer Security

Portada
John Wiley & Sons, Feb 28, 2011 - 436 páginas
4 Opiniones
A completely up-to-date resource on computer security

Assuming no previous experience in the field of computersecurity, this must-have book walks you through the many essentialaspects of this vast topic, from the newest advances in softwareand technology to the most recent information on Web applicationssecurity. This new edition includes sections on Windows NT, CORBA,and Java and discusses cross-site scripting and JavaScript hackingas well as SQL injection. Serving as a helpful introduction, thisself-study guide is a wonderful starting point for examining thevariety of competing security systems and what makes them differentfrom one another.

  • Unravels the complex topic of computer security and breaks itdown in such a way as to serve as an ideal introduction forbeginners in the field of computer security
  • Examines the foundations of computer security and its basicprinciples
  • Addresses username and password, password protection, singlesign-on, and more
  • Discusses operating system integrity, hardware securityfeatures, and memory
  • Covers Unix security, Windows security, database security,network security, web security, and software security

Packed with in-depth coverage, this resource spares no detailswhen it comes to the critical topic of computer security.

 

Comentarios de la gente - Escribir un comentario

Crítica de los usuarios - Marcar como inadecuado

s

Crítica de los usuarios - Marcar como inadecuado

Informative but complex. I enjoyed how the book provided real world examples in many of the chapters, but its matter-of-fact approach to some of the concepts was infuriating. In some of the later chapters, mathematical concepts are used to explain how something works, but they are presented in a mind boggling fashion. In most cases, the formulas are not provided with any context, but inserted into paragraphs as if they were plain English. "After <complex formula here> normal encryption resumes." "Due to <another complex formula> you can see both parties establish encryption."
No, I don't see, and no explanation is ever given as to the deeper meaning of these concepts. It was extremely frustrating to say the least.
 

Contenido

Managing Security
13
CHAPTER3 Foundations of Computer Security
31
CHAPTER4 Identification and Authentication
49
CHAPTER5 Access Control
65
Reference Monitors
87
Unix Security
107
Windows Security
131
Database Security
155
Key Establishment
275
CHAPTER16 Communications Security
297
6
302
7
316
3
328
6
336
Mobility
363
CHAPTER 20 New Access Control Paradigms
385

Software Security
177
BellLaPadula Model
205
CHAPTER12 Security Models
219
Security Evaluation
235
Cryptography
251
2
388
5
395
8
406
Index
423
Derechos de autor

Otras ediciones - Ver todas

Términos y frases comunes

Información bibliográfica