Security in Computing

Front Cover
Prentice Hall Professional, 2003 - Computers - 746 pages
9 Reviews

The classic guide to information security--fully updated for the latest attacks and countermeasures

"Security in Computing, Third Edition" systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them.

  • Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more
  • Security in Internet-based, distributed, desktop and traditional centralized applications
  • New attacks, including scripted vulnerability probing, denial of service, and buffer overflows--with symptoms and cures
  • Clear, accessible introduction to cryptography--without sophisticated math
  • Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography
  • Thoroughly revamped coverage of software engineering practices designed to enhance program security
  • Expanded coverage of risk management, contingency planning, and security policies
  • Detailed presentation of protection in general-purpose and trusted operating systems
  • Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references

Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security.

The companion website (http: //www.phptr.com/pfleeger/) contains additional information, book updates, and instructor's resources.

  

What people are saying - Write a review

User ratings

5 stars
5
4 stars
2
3 stars
1
2 stars
1
1 star
0

User Review - Flag as inappropriate

gb

User Review - Flag as inappropriate

security in computing

All 5 reviews »

Contents

III
1
IV
2
V
4
VI
5
VIII
8
IX
9
XI
12
XII
19
CC
331
CCI
332
CCII
333
CCIII
341
CCIV
343
CCV
344
CCVI
345
CCVII
346

XIII
21
XVI
22
XVIII
25
XIX
27
XX
28
XXIII
29
XXV
30
XXVI
31
XXVIII
32
XXIX
35
XXX
36
XXXII
40
XXXIII
41
XXXV
44
XXXVI
47
XXXVII
52
XL
55
XLII
56
XLIII
59
XLIV
60
XLV
62
XLVII
65
XLIX
67
LI
69
LIV
70
LVI
71
LVII
73
LX
75
LXI
76
LXIII
77
LXIV
79
LXV
81
LXVI
88
LXVII
89
LXVIII
90
LXX
91
LXXI
95
LXXII
96
LXXIV
97
LXXV
100
LXXVIII
104
LXXIX
106
LXXX
108
LXXXIII
111
LXXXIV
113
LXXXV
116
LXXXVIII
120
LXXXIX
124
XCI
126
XCII
128
XCIII
129
XCIV
132
XCV
134
XCVI
137
XCVIII
139
XCIX
141
C
150
CI
151
CII
169
CIII
171
CIV
172
CVI
173
CVII
174
CVIII
175
CIX
176
CX
179
CXII
180
CXV
181
CXVI
183
CXVIII
184
CXIX
185
CXX
187
CXXI
189
CXXII
192
CXXIII
194
CXXV
196
CXXVI
198
CXXVII
201
CXXIX
204
CXXXI
205
CXXXII
207
CXXXIII
208
CXXXIV
209
CXXXVI
212
CXXXVII
218
CXXXVIII
221
CXXXIX
223
CXLI
224
CXLII
225
CXLIII
226
CXLV
229
CXLVI
230
CXLVII
232
CXLIX
235
CL
238
CLI
239
CLII
244
CLIII
250
CLV
251
CLVI
253
CLVII
254
CLVIII
259
CLIX
265
CLX
266
CLXI
269
CLXII
273
CLXIII
274
CLXIV
276
CLXV
281
CLXVI
282
CLXVII
297
CLXVIII
298
CLXIX
300
CLXX
302
CLXXI
303
CLXXII
305
CLXXV
309
CLXXVI
310
CLXXIX
313
CLXXX
314
CLXXXI
315
CLXXXII
316
CLXXXIII
318
CLXXXV
319
CLXXXVIII
320
CXC
321
CXCI
323
CXCIV
324
CXCV
326
CXCVII
327
CXCVIII
329
CXCIX
330
CCIX
350
CCX
357
CCXII
358
CCXIV
359
CCXVI
363
CCXVII
364
CCXVIII
365
CCXIX
369
CCXX
372
CCXXI
381
CCXXII
383
CCXXIII
385
CCXXIV
386
CCXXV
387
CCXXVII
390
CCXXVIII
393
CCXXIX
397
CCXXX
403
CCXXXI
404
CCXXXII
407
CCXXXIII
410
CCXXXIV
411
CCXXXV
412
CCXXXVI
414
CCXXXVII
418
CCXXXVIII
420
CCXXXIX
424
CCXL
425
CCXLIII
428
CCXLV
430
CCXLVI
443
CCXLVII
444
CCXLVIII
450
CCXLIX
452
CCLI
453
CCLII
454
CCLIII
457
CCLV
458
CCLVII
464
CCLVIII
465
CCLIX
466
CCLXI
468
CCLXII
469
CCLXIII
471
CCLXIV
473
CCLXVI
474
CCLXVII
475
CCLXVIII
478
CCLXIX
479
CCLXX
481
CCLXXI
483
CCLXXII
484
CCLXXIII
485
CCLXXIV
491
CCLXXV
492
CCLXXVI
493
CCLXXVII
499
CCLXXIX
500
CCLXXX
503
CCLXXXI
506
CCLXXXII
507
CCLXXXIV
526
CCLXXXV
529
CCLXXXVIII
531
CCLXXXIX
532
CCXC
533
CCXCI
535
CCXCII
538
CCXCIV
540
CCXCV
541
CCXCVI
543
CCXCVII
545
CCXCVIII
548
CCC
549
CCCI
550
CCCII
551
CCCIII
553
CCCIV
555
CCCV
556
CCCVI
561
CCCVII
564
CCCVIII
565
CCCIX
568
CCCXI
570
CCCXII
572
CCCXIII
574
CCCXIV
575
CCCXVI
578
CCCXVII
579
CCCXVIII
580
CCCXIX
583
CCCXXI
586
CCCXXIII
587
CCCXXIV
589
CCCXXV
590
CCCXXVI
591
CCCXXVIII
594
CCCXXIX
595
CCCXXXI
600
CCCXXXII
605
CCCXXXIV
606
CCCXXXV
608
CCCXXXVI
610
CCCXXXVII
611
CCCXXXVIII
612
CCCXXXIX
614
CCCXL
615
CCCXLI
616
CCCXLII
617
CCCXLIII
619
CCCXLV
622
CCCXLVI
625
CCCXLVII
626
CCCXLIX
627
CCCL
629
CCCLI
630
CCCLIII
637
CCCLIV
642
CCCLVI
644
CCCLVII
660
CCCLVIII
666
CCCLX
667
CCCLXI
678
CCCLXII
682
CCCLXIII
683
CCCLXV
684
CCCLXVII
686
CCCLXIX
687
CCCLXX
688
CCCLXXIII
691
CCCLXXIV
727
Copyright

Common terms and phrases

References to this book

All Book Search results »

About the author (2003)

CHARLES P. PFLEEGER is a Master Security Architect for Cable & Wireless, the world's premier web hosting and Internet solutions provider. He regularly advises clients on secure design and implementation of network applications and architectures.

SHARI LAWRENCE PFLEEGER, senior researcher for RAND, is author of eight books on software engineering, measurement, and quality, including Software Engineering: Theory and Practice, Second Edition (Prentice Hall). She was named by The Journal of Systems and Software as one of the world's top software engineering researchers.

Foreword by Willis H. Ware.

Bibliographic information