Computer Security

Front Cover
John Wiley & Sons, Feb 28, 2011 - Computers - 436 pages
4 Reviews
A completely up-to-date resource on computer security

Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another.

  • Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security
  • Examines the foundations of computer security and its basic principles
  • Addresses username and password, password protection, single sign-on, and more
  • Discusses operating system integrity, hardware security features, and memory
  • Covers Unix security, Windows security, database security, network security, web security, and software security

Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.

 

What people are saying - Write a review

User Review - Flag as inappropriate

s

User Review - Flag as inappropriate

Informative but complex. I enjoyed how the book provided real world examples in many of the chapters, but its matter-of-fact approach to some of the concepts was infuriating. In some of the later chapters, mathematical concepts are used to explain how something works, but they are presented in a mind boggling fashion. In most cases, the formulas are not provided with any context, but inserted into paragraphs as if they were plain English. "After <complex formula here> normal encryption resumes." "Due to <another complex formula> you can see both parties establish encryption."
No, I don't see, and no explanation is ever given as to the deeper meaning of these concepts. It was extremely frustrating to say the least.
 

Contents

Managing Security
13
CHAPTER3 Foundations of Computer Security
31
CHAPTER4 Identification and Authentication
49
CHAPTER5 Access Control
65
Reference Monitors
87
Unix Security
107
Windows Security
131
Database Security
155
Key Establishment
275
CHAPTER16 Communications Security
297
6
302
7
316
3
328
6
336
Mobility
363
CHAPTER 20 New Access Control Paradigms
385

Software Security
177
BellLaPadula Model
205
CHAPTER12 Security Models
219
Security Evaluation
235
Cryptography
251
2
388
5
395
8
406
Index
423
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information