SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Security in Computing

Security in Computing, 5. udgave

Security in Computing

Charles Pfleeger, Shari Pfleeger og Jonathan Margulies
(2015)
Sprog: Engelsk
Pearson Education, Limited
1.097,00 kr. 987,30 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage
Security in Computing, 5. udgave

Security in Computing Vital Source e-bog

Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
(2015)
Pearson International
610,00 kr. 549,00 kr.
Leveres umiddelbart efter køb

Detaljer om varen

  • 5. Udgave
  • Hardback: 944 sider
  • Udgiver: Pearson Education, Limited (Februar 2015)
  • Forfattere: Charles Pfleeger, Shari Pfleeger og Jonathan Margulies
  • ISBN: 9780134085043
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on "Security in Computing" as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today s newest technologies, attacks, standards, and trends. " Security in Computing, Fifth Edition, " offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You ll start by mastering the field s basic terms, principles, and concepts. Next, you ll apply these basics in diverse situations and environments, learning to think like an attacker and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare recent attacks and emerging risks Security flaws and risks associated with electronic voting systems "
Foreword xix Preface xxv Acknowledgments xxxi About the Authors xxxiii
Chapter 1: Introduction 1
1.1 What Is Computer Security? 2
1.2 Threats 6
1.3 Harm 21
1.4 Vulnerabilities 28
1.5 Controls 28
1.6 Conclusion 31
1.7 What's Next? 32
1.8 Exercises 34
Chapter 2: Toolbox: Authentication, Access Control, and Cryptography 36
2.1 Authentication 38
2.2 Access Control 72
2.3 Cryptography 86
2.4 Exercises 127
Chapter 3: Programs and Programming 131
3.1 Unintentional (Nonmalicious) Programming Oversights 133
3.2 Malicious Code--Malware 166
3.3 Countermeasures 196
Chapter 4: The Web--User Side 232
4.1 Browser Attacks 234
4.2 Web Attacks Targeting Users 245
4.3 Obtaining User or Website Data 260
4.4 Email Attacks 267
4.5 Conclusion 277
4.6 Exercises 278
Chapter 5: Operating Systems 280
5.1 Security in Operating Systems 280
5.2 Security in the Design of Operating Systems 308
5.3 Rootkit 329
5.4 Conclusion 338
5.5 Exercises 339
Chapter 6: Networks 341
6.1 Network Concepts 342
Part I--War on Networks: Network Security Attacks 353
6.2 Threats to Network Communications 354
6.3 Wireless Network Security 374
6.4 Denial of Service 396
6.5 Distributed Denial-of-Service 421
Part II--Strategic Defenses: Security Countermeasures 432
6.6 Cryptography in Network Security 432
6.7 Firewalls 451
6.8 Intrusion Detection and Prevention Systems 474
6.9 Network Management 489
6.10 Conclusion 496
6.11 Exercises 496
Chapter 7: Databases 501
7.1 Introduction to Databases 502
7.2 Security Requirements of Databases 507
7.3 Reliability and Integrity 513
7.4 Database Disclosure 518
7.5 Data Mining and Big Data 535
7.6 Conclusion 549
Chapter 8: Cloud Computing 551
8.1 Cloud Computing Concepts 551
8.2 Moving to the Cloud 553
8.3 Cloud Security Tools and Techniques 560
8.4 Cloud Identity Management 568
8.5 Securing IaaS 579
8.6 Conclusion 583
8.7 Exercises 584
Chapter 9: Privacy 586
9.1 Privacy Concepts 587
9.2 Privacy Principles and Policies 596
9.3 Authentication and Privacy 610
9.4 Data Mining 616
9.5 Privacy on the Web 619
9.6 Email Security 632
9.7 Privacy Impacts of Emerging Technologies 636
9.8 Where the Field Is Headed 644
9.9 Conclusion 645
9.10 Exercises 645
Chapter 10: Management and Incidents 647
10.1 Security Planning 647
10.2 Business Continuity Planning 658
10.3 Handling Incidents 662
10.4 Risk Analysis 668
10.5 Dealing with Disaster 686
10.6 Conclusion 699
10.7 Exercises 700
Chapter 11: Legal Issues and Ethics 702
11.1 Protecting Programs and Data 704
11.2 Information and the Law 717
11.3 Rights of Employees and Employers 725
11.4 Redress for Software Failures 728
11.5 Computer Crime 733
11.6 Ethical Issues in Computer Security 744
11.7 Incident Analysis with Ethics 750
Chapter 12: Details of Cryptography 768
12.1 Cryptology 769
12.2 Symmetric Encryption Algorithms 779
12.3 Asymmetric Encryption with RSA 795
12.4 Message Digests 799
12.5 Digital Signatures 802
12.6 Quantum Cryptography 807
12.7 Conclusion 811
Chapter 13: Emerging Topics 813
13.1 The Internet of Things 814
13.2 Economics 821
13.3 Electronic Voting 834
13.4 Cyber Warfare 841
13.5 Conclusion 850 Bibliography 851 Index 877

Detaljer om varen

  • 5. Udgave
  • Vital Source 180 day rentals (dynamic pages)
  • Udgiver: Pearson International (Januar 2015)
  • Forfattere: Charles P. Pfleeger, Shari Lawrence Pfleeger og Jonathan Margulies
  • ISBN: 9780134085050R180
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems  
Licens varighed:
Bookshelf online: 180 dage fra købsdato.
Bookshelf appen: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)
De oplyste priser er inkl. moms

Om denne ebog

Bemærk: Dette er en tidsbegrænset Vital Source e-bog, som kan læses  i Bookshelf appen - og online med en browser i en begrænset periode. (Se den enkelte bog for mere information.)

 

Bøgerne er lavet til studiebrug og har gode indbyggede værktøjer  til bl.a. søgning , tekst markering, note tagning m.v.

 

Bookshelf appen findes til forskellige systemer, er gratis og kan downloades her.  

 

For mere information om anskaffelse og brug af Vital Source ebøger, se vores FAQ.

Senest sete

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.