text.skipToContent text.skipToNavigation
  1. Home
  2. Computer Science & IT
  3. Security in Computing

Security in Computing, 5th edition

  • Charles P. Pfleeger
  • Shari Lawrence Pfleeger
  • Jonathan Margulies

Published by Prentice Hall (January 26th 2015) - Copyright © 2015

5th edition

Chosen format
View all
Security in Computing

ISBN-13: 9780134085050

Includes: Unassigned

This product is not available in your country

What's included

  • Unassigned

Overview

Table of contents

Foreword         xix

Preface         xxv

Acknowledgments         xxxi

About the Authors         xxxiii

 

Chapter 1: Introduction         1

1.1 What Is Computer Security?   2

1.2 Threats   6

1.3 Harm   21

1.4 Vulnerabilities   28

1.5 Controls   28

1.6 Conclusion   31

1.7 What’s Next?   32

1.8 Exercises   34

 

Chapter 2: Toolbox: Authentication, Access Control, and Cryptography         36

2.1 Authentication   38

2.2 Access Control   72

2.3 Cryptography   86

2.4 Exercises   127

 

Chapter 3: Programs and Programming         131

3.1 Unintentional (Nonmalicious) Programming Oversights   133

3.2 Malicious Code—Malware   166

3.3 Countermeasures   196

 

Chapter 4: The Web—User Side         232

4.1 Browser Attacks   234

4.2 Web Attacks Targeting Users   245

4.3 Obtaining User or Website Data   260

4.4 Email Attacks   267

4.5 Conclusion   277

4.6 Exercises   278

 

Chapter 5: Operating Systems         280

5.1 Security in Operating Systems   280

5.2 Security in the Design of Operating Systems   308

5.3 Rootkit   329

5.4 Conclusion   338

5.5 Exercises   339

 

Chapter 6: Networks         341

6.1 Network Concepts  342

Part I—War on Networks: Network Security Attacks   353

6.2 Threats to Network Communications   354

6.3 Wireless Network Security   374

6.4 Denial of Service   396

6.5 Distributed Denial-of-Service   421

Part II—Strategic Defenses: Security Countermeasures   432

6.6 Cryptography in Network Security   432

6.7 Firewalls   451

6.8 Intrusion Detection and Prevention Systems   474

6.9 Network Management 489

6.10 Conclusion   496

6.11 Exercises   496

 

For teachers

All the material you need to teach your courses.

Discover teaching material