Amazon cover image
Image from Amazon.com

Computer security : principles and practice / William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.

By: Contributor(s): Material type: TextTextPublication details: Boston : Pearson, c2012.Edition: 2nd edDescription: xxii, 788 p. : ill. ; 24 cmISBN:
  • 9780132775069 (alk. paper)
  • 0132775069 (alk. paper)
Subject(s): DDC classification:
  • 005.8
LOC classification:
  • QA 76.9 S782c 2012
Contents:
Cryptographic tools -- User authentication -- Access control -- Database security -- Malicious software -- Denial-of-service attacks -- Intrusion detection -- Firewalls and intrusion prevention systems -- Buffer overflow -- Software security -- Operating system security -- Trusted computing and multilevel security -- IT security management and risk assessment -- IT security controls, plans, and procedures -- Physical and infrastructure security -- Human resources security -- Security auditing -- Legal and ethical aspects -- Symmetric encryption and message confidentiality -- Public-key cryptography and message authentication -- Internet security protocols and standards -- Internet authentication applications -- Wireless network security -- Appendix A. Projects and other student exercises for teaching computer security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Shelving location Call number Vol info Copy number Status Barcode
Libro Libro Biblioteca Juan Bosch Biblioteca Juan Bosch Humanidades Humanidades (4to. Piso) QA 76.9 S782c 2012 (Browse shelf(Opens below)) 1 1 Available 00000108583

Includes bibliographical references (p. 756-773) and index.

Cryptographic tools -- User authentication -- Access control -- Database security -- Malicious software -- Denial-of-service attacks -- Intrusion detection -- Firewalls and intrusion prevention systems -- Buffer overflow -- Software security -- Operating system security -- Trusted computing and multilevel security -- IT security management and risk assessment -- IT security controls, plans, and procedures -- Physical and infrastructure security -- Human resources security -- Security auditing -- Legal and ethical aspects -- Symmetric encryption and message confidentiality -- Public-key cryptography and message authentication -- Internet security protocols and standards -- Internet authentication applications -- Wireless network security -- Appendix A. Projects and other student exercises for teaching computer security.

There are no comments on this title.

to post a comment.