Computer Security: Principles and Practice, 3rd Edition
- Length: 840 pages
- Edition: 3
- Language: English
- Publisher: Pearson
- Publication Date: 2014-07-18
- ISBN-10: 0133773922
- ISBN-13: 9780133773927
- Sales Rank: #193700 (See Top 100 Books)
Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists.
In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.
The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.
Teaching and Learning Experience
This program presents a better teaching and learning experience—for you and your students. It will help:
- Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective.
- Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security.
- Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material.
- Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.
Table of Contents
Chapter 0 Reader’s and Instructor’s Guide
Chapter 1 Overview
PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
Chapter 3 User Authentication
Chapter 4 Access Control
Chapter 5 Database and Cloud Security
Chapter 6 Malicious Software
Chapter 7 Denial-of-Service Attacks
Chapter 8 Intrusion Detection
Chapter 9 Firewalls and Intrusion Prevention Systems
PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS
Chapter 10 Buffer Overflow
Chapter 11 Software Security
Chapter 12 Operating System Security
Chapter 13 Trusted Computing and Multilevel Security
PART THREE: MANAGEMENT ISSUES
Chapter 14 IT Security Management and Risk Assessment
Chapter 15 IT Security Controls, Plans, and Procedures
Chapter 16 Physical and Infrastructure Security
Chapter 17 Human Resources Security
Chapter 18 Security Auditing
Chapter 19 Legal and Ethical Aspects
PART FOUR: CRYPTOGRAPHIC ALGORITHMS
Chapter 20 Symmetric Encryption and Message Confidentiality
Chapter 21 Public-Key Cryptography and Message Authentication
PART FIVE: NETWORK SECURITY
Chapter 22 Internet Security Protocols and Standards
Chapter 23 Internet Authentication Applications
Chapter 24 Wireless Network Security
Appendix A: Projects and Other Student Exercises for Teaching Computer Security
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.