Computer Security, 3rd Edition Front Cover

Computer Security, 3rd Edition

  • Length: 456 pages
  • Edition: 3
  • Publisher:
  • Publication Date: 2011-02-28
  • ISBN-10: 0470741155
  • ISBN-13: 9780470741153
  • Sales Rank: #388331 (See Top 100 Books)
Description

A completely up-to-date resource on computer security

Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another.

  • Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security
  • Examines the foundations of computer security and its basic principles
  • Addresses username and password, password protection, single sign-on, and more
  • Discusses operating system integrity, hardware security features, and memory
  • Covers Unix security, Windows security, database security, network security, web security, and software security

Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.

Table of Contents

CHAPTER 1 – History of Computer Security
CHAPTER 2 – Managing Security
CHAPTER 3 – Foundations of Computer Security
CHAPTER 4 – Identification and Authentication
CHAPTER 5 – Access Control
CHAPTER 6 – Reference Monitors
CHAPTER 7 – Unix Security
CHAPTER 8 – Windows Security
CHAPTER 9 – Database Security
CHAPTER 10 – Software Security
CHAPTER 11 – Bell–LaPadula Model
CHAPTER 12 – Security Models
CHAPTER 13 – Security Evaluation
CHAPTER 14 – Cryptography
CHAPTER 15 – Key Establishment
CHAPTER 16 – Communications Security
CHAPTER 17 – Network Security
CHAPTER 18 – Web Security
CHAPTER 19 – Mobility
CHAPTER 20 – New Access Control Paradigms

To access the link, solve the captcha.