Security in Computing
Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired.
What people are saying - Write a review
We haven't found any reviews in the usual places.
BASIC ENCRYPTION AND DECRYPTION
SECURE ENCRYPTION SYSTEMS
PROTOCOLS AND PRACTICES
9 other sections not shown
Other editions - View all
access control access rights analysis applications attack authentication backup bits block called chapter cipher ciphertext communication computer crime computer security computing system confidentiality copy covert channel cryptanalyst cryptographic data base manager decrypt described devices disk distribution effect employee enciphered encryption algorithm encryption key error ethical evaluation example firewall flaw function hardware host identify implementation index of coincidence integrity interceptor Internet Kerberos key escrow knapsack layer letters machine malicious code Merkle-Hellman modify modules multilevel security node object operating system password patent perform permutation personal computer plaintext PR/SM problem protection protocol public key query receiver requirements result S-boxes secrecy secret security kernel security policy segment sender sends sensitive data server shown in Figure Table TCSEC technique testing tion trusted trusted operating system Unix user's virus viruses vulnerabilities