For courses in computer/network security. Balance principles and standards with current practice Computer Security incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give students an understanding of the unifying theory and application of important concepts. Hands-on hacking, programming, firewall and lab exercises, real-world case studies and security assessments reinforce understanding of the material. The 5th Edition is an updated survey of the…mehr
For courses in computer/network security. Balance principles and standards with current practice Computer Security incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give students an understanding of the unifying theory and application of important concepts. Hands-on hacking, programming, firewall and lab exercises, real-world case studies and security assessments reinforce understanding of the material. The 5th Edition is an updated survey of the fast-moving world of computer and network security, with new coverage of important topics.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dr. William Stallings has authored 19 titles and, counting revised editions, more than 40 books on computer security, computer networking and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection and use of networking software and products. He created and maintains the Computer Science Student Resource Site. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering.
Inhaltsangabe
1. Overview 2. Cryptographic Tools 3. User Authentication 4. Access Control 5. Database and Data Center Security 6. Malicious Software 7. Denial-of-Service Attacs 8. Intrusion Detection 9. Firewalls and Intrusion Prevention Systems 10. Buffer Overflow 11. Software Security 12. Operating Systems Security 13. Cloud and IoT Security 14. IT Security Management and Risk Assessment 15. IT Security Controls, plans, and Procedures 16. Physical and Infrastructure Security 17. Human Resources Security 18. Security Auiditing 19. Legal and Ethical Aspects 20. Symmetric Encryption and Message Confidentiality 21. Public-Key Cryptography and Message Authentication 22. Internet Security Protocols and Standards 23. Internet Authentication Applications 24. Wireless Network Security APPENDICES 1. Projects and Other Student Exercises for Teaching Computer Security 2. Some Aspects of Number Theory 3. Standards and Standard-Setting Organizations 4. Random and Pseudorandom Number Generation 5. Message Authentication Codes Based on Block Ciphers 6. The TCP/IP Protocol Architecture 7. Radix-64 Conversion 8. The Domain Name System 9. The Base Rate Fallacy 10. SHA-3 814 11. Glossary
1. Overview 2. Cryptographic Tools 3. User Authentication 4. Access Control 5. Database and Data Center Security 6. Malicious Software 7. Denial-of-Service Attacs 8. Intrusion Detection 9. Firewalls and Intrusion Prevention Systems 10. Buffer Overflow 11. Software Security 12. Operating Systems Security 13. Cloud and IoT Security 14. IT Security Management and Risk Assessment 15. IT Security Controls, plans, and Procedures 16. Physical and Infrastructure Security 17. Human Resources Security 18. Security Auiditing 19. Legal and Ethical Aspects 20. Symmetric Encryption and Message Confidentiality 21. Public-Key Cryptography and Message Authentication 22. Internet Security Protocols and Standards 23. Internet Authentication Applications 24. Wireless Network Security APPENDICES 1. Projects and Other Student Exercises for Teaching Computer Security 2. Some Aspects of Number Theory 3. Standards and Standard-Setting Organizations 4. Random and Pseudorandom Number Generation 5. Message Authentication Codes Based on Block Ciphers 6. The TCP/IP Protocol Architecture 7. Radix-64 Conversion 8. The Domain Name System 9. The Base Rate Fallacy 10. SHA-3 814 11. Glossary
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826