Computer System and Network Security
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference.
Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails.
This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Fundamentals of Computer Security
Developing Secure Computer Systems
Access and Information Flow Controls
Auditing and Intrusion Detection
Damage Control and Assessment
GovernmentBased Security Standards
Other editions - View all
Access Controls access the system actions additional algorithm allow application-level gateways attack attempt audit trails authentication system authorized users bastion host bits checksum ciphertext Clark-Wilson model Computer Security Conference covert channels damage database decrypt determine Discretionary Access Controls encryption environment evaluation example execution Figure fingerprint fingerprint authentication firewall function gain access gateway hand geometry identify IEEE implement individual infected installation intruder intruder's intrusion detection intrusive activity ITSEC layer loss magnetic card malicious Mandatory Access Mandatory Access Controls method modification monitor National Computer Security network security object operating system perform plaintext possible prevent problem protect remove risk analysis rlogin router Secret secure computer system security levels security model security policy signature specific Step superuser system administrator system security TCSEC techniques threat traffic transmission Trojan Horse trusted unauthorized UNIX user accounts user's virus viruses vulnerabilities worm