Computer Security | Principles and Practice | Fourth Edition | By Pearson 4 Edition(English, Paperback, William Stallings, Lawrie Brown)
Quick Overview
Product Price Comparison
Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate—and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. Features: - Capture the most recent changes in the field.- The content in the book is unified by four basic themes. - Principles, Design approaches, Standards, Real-world examples.- Engaging features that enhance learning-Hacking & Laboratory exercises, Security education (SEED) , Research , Firewall & Programming projects, Practical security & Reading/report assignments.Table of Contents: Chapter 1) OverviewPART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLESChapter 2) Cryptographic ToolsChapter 3) User AuthenticationChapter 4) Access ControlChapter 5) Database and Data Center SecurityChapter 6) Malicious SoftwareChapter 7) Denial-of-Service AttacksChapter 8) Intrusion DetectionChapter 9) Firewalls and Intrusion Prevention SystemsPART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMSChapter 10) Buffer OverflowChapter 11) Software SecurityChapter 12) Operating System SecurityChapter 13) Cloud and IoT SecurityPART THREE: MANAGEMENT ISSUESChapter 14) IT Security Management and Risk AssessmentChapter 15) IT Security Controls, Plans and ProceduresChapter 16) Physical and Infrastructure SecurityChapter 17) Human Resources SecurityChapter 18) Security AuditingChapter 19) Legal and Ethical AspectsPART FOUR: CRYPTOGRAPHIC ALGORITHMSChapter 20) Symmetric Encryption and Message ConfidentialityChapter 21) Public-Key Cryptography and Message AuthenticationPART FIVE: NETWORK SECURITYChapter 22) Internet Security Protocols and StandardsChapter 23) Internet Authentication ApplicationsChapter 24) Wireless Network Security