Зарегистрироваться
Восстановить пароль
FAQ по входу

Stallings W., Brown L. Computer Security. Principles and Practice

  • Файл формата pdf
  • размером 13,64 МБ
  • Добавлен пользователем
  • Отредактирован
Stallings W., Brown L. Computer Security. Principles and Practice
Pearson, 2012. — 817 p. — 2nd ed. — ISBN: 0132775069, 9780132775069
In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
It covers all security topics considered Core in the IEEE/ACM Computer Science Curriculum 2008: An Interim Revision to CS 2001. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.
The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.
Visit Stallings' Companion Website at for student and instructor resources and his Computer Science Student Resource site
Contents
Online Resources
Notation
About the Authors
Preface
Reader’s and Instructor’s Guide
Overview
Computer Security Technology and Principles
Cryptographic Tools
User Authentication
Access Control
Database Security
Malicious Software
Denial-of-Service Attacks
Intrusion Detection
Firewalls and Intrusion Prevention Systems
Software Security and Trusted Systems
Buffer Overflow
Software Security
Operating System Security
Trusted Computing and Multilevel Security
Management Issues
IT Security Management and Risk Assessment
IT Security Controls, Plans, and Procedures
Physical and Infrastructure Security
Human Resources Security
Security
Legal and Ethical Aspects
Cryptographic Algorithms
Symmetric Encryption and Message Confidentiality
Public-Key Cryptography and Message Authentication
Network Security
Internet Security Protocols and Standards
Internet Authentication Applications
Wireless Network Security
Appendices
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация