Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Security in Computing, Third Edition Table of Contents Copyright About Prentice Hall Professional Technical Reference Foreword
Citations
Preface to the Third Edition
Why Read This Book? Users and Uses of This Book What Is New in This Book? Acknowledgments
Chapter 1. Is There a Security Problem in Computing?
1.1 What Does "Secure" Mean? 1.2 Attacks 1.3 The Meaning of Computer Security 1.4 Computer Criminals 1.5 Methods of Defense 1.6 What's Next 1.7 Summary 1.8 Terms and Concepts 1.9 Where the Field Is Headed 1.10 To Learn More 1.11 Exercises
Chapter 2. Elementary Cryptography
2.1 Terminology and Background 2.2 Substitution Ciphers 2.3 Transpositions (Permutations) 2.4 Making "Good" Encryption Algorithms 2.5 The Data Encryption Standard (DES) 2.6 The AES Encryption Algorithm 2.7 Public Key Encryption 2.8 The Uses of Encryption 2.9 Summary of Encryption 2.10 Terms and Concepts 2.11 Where the Field Is Headed 2.12 To Learn More 2.13 Exercises
Chapter 3. Program Security
3.1 Secure Programs 3.2 Nonmalicious Program Errors 3.3 Viruses and Other Malicious Code 3.4 Targeted Malicious Code 3.5 Controls Against Program Threats 3.6 Summary of Program Threats and Controls 3.7 Terms and Concepts 3.8 Where the Field Is Headed 3.9 To Learn More 3.10 Exercises
Chapter 4. Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection 4.2 Memory and Address Protection 4.3 Control of Access to General Objects 4.4 File Protection Mechanisms 4.5 User Authentication 4.6 Summary of Security for Users 4.7 Terms and Concepts 4.8 Where the Field Is Headed 4.9 To Learn More 4.10 Exercises
Chapter 5. Designing Trusted Operating Systems
5.1 What Is a Trusted System? 5.2 Security Policies 5.3 Models of Security 5.4 Trusted Operating System Design 5.5 Assurance in Trusted Operating Systems 5.6 Implementation Examples 5.7 Summary of Security in Operating Systems 5.8 Terms and Concepts 5.9 Where the Field Is Headed 5.10 To Learn More 5.11 Exercises
Chapter 6. Database Security
6.1 Introduction to Databases 6.2 Security Requirements 6.3 Reliability and Integrity 6.4 Sensitive Data 6.5 Inference 6.6 Multilevel Databases 6.7 Proposals for Multilevel Security 6.8 Summary of Database Security 6.9 Terms and Concepts 6.10 Where the Field Is Headed 6.11 To Learn More 6.12 Exercises
Chapter 7. Security in Networks
7.1 Network Concepts 7.2 Threats in Networks 7.3 Network Security Controls 7.4 Firewalls 7.5 Intrusion Detection Systems 7.6 Secure E-Mail 7.7 Summary of Network Security 7.8 Terms and Concepts 7.9 Where the Field Is Headed 7.10 To Learn More 7.11 Exercises
Chapter 8. Administering Security
8.1 Security Planning 8.2 Risk Analysis 8.3 Organizational Security Policies 8.4 Physical Security 8.5 Summary 8.6 Terms and Concepts 8.7 To Learn More 8.8 Exercises
Chapter 9. Legal, Privacy, and Ethical Issues in Computer Security
9.1 Protecting Programs and Data 9.2 Information and the Law 9.3 Rights of Employees and Employers 9.4 Software Failures 9.5 Computer Crime 9.6 Privacy 9.7 Ethical Issues in Computer Security 9.8 Case Studies of Ethics 9.9 Terms and Concepts 9.10 To Learn More 9.11 Exercises
Chapter 10. Cryptography Explained
10.1 Mathematics for Cryptography 10.2 Symmetric Encryption 10.3 Public Key Encryption Systems 10.4 Quantum Cryptography 10.5 Summary of Encryption 10.6 Terms and Concepts 10.7 Where the Field Is Headed 10.8 To Learn More 10.9 Exercises
Bibliography
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion