Amazon cover image
Image from Amazon.com
Image from Coce

Computer security : principles and practice / William Stallings and Lawrie Brown.

By: Contributor(s): Material type: TextTextPublication details: Boston, MA : Pearson, 2015.Edition: Third editionDescription: 840 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781292066172
Subject(s): DDC classification:
  • 005.8 St18c
LOC classification:
  • QA76.9.A25 S685
Summary: Reader’s and Instructor’s Guide – Overview – Computer Security Technology and Principles – Cryptographic Tools – User Authentication – Access Control – Database and Cloud Security – Malicious Software – Denial-of-Service-Attacks – Intrusion Detection – Firewalls and Intrusion Prevention Systems – Software Security and Trusted Systems – Buffer Overflow – Software Security – Operating System Security – Trusted Computing and Multilevel Security – Management Issues – IT Security Management and Risk Assessment – IT Security Controls, Plans and Procedures – Physical and Infrastructure Security – Human Resource Security – Security Auditing – Legal and Ethical Aspects – Cryptographic Algorithms – Symmetric Encryption and Message Confidentiality – Public-Key Cryptographic and Message Authentication – Network Security – Internet Security Protocols and Standards – Internet Authentication Applications – Wireless Network Security – Linux Security – Windows and Windows Vista Security
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library-Nabua Circulation Section CIR 005.8 St18c 2015 (Browse shelf(Opens below)) 1-1 Available 024435

Includes index.

Includes bibliographical references.

Reader’s and Instructor’s Guide – Overview – Computer Security Technology and Principles – Cryptographic Tools – User Authentication – Access Control – Database and Cloud Security – Malicious Software – Denial-of-Service-Attacks – Intrusion Detection – Firewalls and Intrusion Prevention Systems – Software Security and Trusted Systems – Buffer Overflow – Software Security – Operating System Security – Trusted Computing and Multilevel Security – Management Issues – IT Security Management and Risk Assessment – IT Security Controls, Plans and Procedures – Physical and Infrastructure Security – Human Resource Security – Security Auditing – Legal and Ethical Aspects – Cryptographic Algorithms – Symmetric Encryption and Message Confidentiality – Public-Key Cryptographic and Message Authentication – Network Security – Internet Security Protocols and Standards – Internet Authentication Applications – Wireless Network Security – Linux Security – Windows and Windows Vista Security

There are no comments on this title.

to post a comment.