Secure Computing: Threats and Safeguards
The breadth of coverage and the attention to real-world context make this authoritative book unique in its treatment of an extemely hot topic-the security of computers, computer networks, and the information that they handle. No other single unified volume covers the field as completely. Topics include: threats (intruder, insider and natural disaster), managing security, risk analysis, intrusion detection, incident response, security policies and models, cryptography, UNIX and Windows NT security, Network security, LAN security, database security, privacy, ethics, and security standards. Drawing upon extensive experience, author Rita C. Summers presents security principles and techniques in a coherent framework, using case histories and examples to drive home important points. Each chapter features a summary, exercises, and extensive bibliographic notes and references.
The Context for Computer Security
22 other sections not shown
access control lists administrators Alamitos algorithm applications architecture attack audit auditor authentication authorization backup Calif called capability Chap cipher ciphertext Communications Computer Security Conference Computer Society Symposium computing system confidentiality covert channels criteria cryptography cryptosystem database DBMS decryption described detection developed devices digital signatures discretionary access control distributed domain encryption enforce Evaluation example function hardware host IEEE Computer Society implemented integrity Internet intrusion ITSEC kernel keystream layer mandatory access control ment methods multilevel secure National Computer Security NCSC needs network security object object-oriented operating system organization password plaintext privilege problem Proceedings protection protocols public key requirements risk analysis role safeguards secret key Security and Privacy security policy segment separation of duty server specific standards stream ciphers System Security TCSEC threats tion transaction trusted UNIX user's verify vulnerabilities workstation