skip to content
Security in computing Preview this item
ClosePreview this item
Checking...

Security in computing

Author: Charles P Pfleeger; Shari Lawrence Pfleeger; Jonathan Margulies
Publisher: Upper Saddle River, NJ : Prentice Hall, [2015]
Edition/Format:   Print book : English : Fifth editionView all editions and formats
Summary:
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Charles P Pfleeger; Shari Lawrence Pfleeger; Jonathan Margulies
ISBN: 9780134085043 0134085043 0134085094 9780134085098
OCLC Number: 893452682
Description: xxxiii, 910 pages : illustrations ; 24 cm
Contents: Introduction --
Toolbox : authentication, access control, and cryptography --
Programs and programming --
The Web : user side --
Operating systems --
Networks --
Databases --
Cloud computing --
Privacy --
Management and incidents --
Legal issues and ethics --
Details of cryptography --
Emerging topics.
Responsibility: Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies.

Abstract:

This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles. It will introduce cryptography early in the book to provide a solid background on types of algorithms, appropriate uses of these different types, and advanced concepts such as digital signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will cover these topics without revealing the internals of cryptography; closer to the end of the book it will delve into the internals of specific algorithms. In this way, readers who want to know the details can study those (and can even read the later chapter early, out of the normal sequence), but it will not unnecessarily burden readers who, like most users, will never get closer to cryptography than an encrypt() function. One strength of SiC4 has been its sidebars. Readers enjoy the brief examples of real life exploits. Fortunately, the news is full of stories of security failures, and it is important to connect these actual events to the strong pedagogy of the book. ACS, which was organized around attacks of different types, include many timely incident stories that we can pull into SiC5. Cloud computing and mobile code and computing are not covered extensively in SiC4. Cloud computing appears as a six page interlude in ACS, but in the few years since ACS was written, the use of cloud computing has expanded, as well as the security ramifications. We intend to devote an entire chapter to cloud computing. Similarly, mobile code and mobile computing have grown. These topics appeared briefly in SiC4 and ACS, but we plan to expand mobile computing into its own chapter, as well. The topic progression of SiC4 largely followed its predecessor editions, back to the first edition (1988). In 1988 networking was certainly neither as important nor pervasive as it has become. Trying to defer all coverage of network topics until Chapter 7, its position in SiC4 delays important content significantly and, perhaps more importantly, makes for a long and broad network security chapter. In 1988 readers had less direct contact with a network than now, and these readers had limited experience using a network prior to reading the book. Obviously readers in 2014 come with vastly more network exposure. This exposure is an asset: Readers now can appreciate a network-delivered attack even before they study network security. SiC5 will take advantage of readers' familiarity with networks, and present attacks delivered by a network-assisted attacker based on the primary source of vulnerability -- software, operating system, protocol, user error -- and not defer these topics to the networks chapter just because a network was involved in the attack. Finally, privacy has been an important topic in the book in early editions, and its importance and coverage have grown as well. The authors will again expand the coverage of privacy, expanding on topics such as web tracking and social networking. These additions cannot come without some pruning. Previously hot topics, such as trusted operating systems and multilevel databases, are being pared down. The authors will also reconsider topics such as economics and management which, although interesting and important, appeal to a relatively small target audience. - Publisher.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (1)

View most popular tags as: tag list | tag cloud

Similar Items

Related Subjects:(5)

User lists with this item (1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/893452682> # Security in computing
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "893452682" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/6393102#Topic/it_sakerhet> ; # IT-säkerhet
    schema:about <http://experiment.worldcat.org/entity/work/data/6393102#Topic/dataskydd> ; # Dataskydd
    schema:about <http://experiment.worldcat.org/entity/work/data/6393102#Topic/data_protection> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/6393102#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/6393102#Topic/privacy_right_of> ; # Privacy, Right of
    schema:bookEdition "Fifth edition." ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/6393102#Person/margulies_jonathan> ; # Jonathan Margulies
    schema:contributor <http://experiment.worldcat.org/entity/work/data/6393102#Person/pfleeger_shari_lawrence> ; # Shari Lawrence Pfleeger
    schema:creator <http://experiment.worldcat.org/entity/work/data/6393102#Person/pfleeger_charles_p_1948> ; # Charles P. Pfleeger
    schema:datePublished "2015" ;
    schema:description "This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand. But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles. It will introduce cryptography early in the book to provide a solid background on types of algorithms, appropriate uses of these different types, and advanced concepts such as digital signatures and cryptographic hash codes. It will also address how cryptography can fail. However, it will cover these topics without revealing the internals of cryptography; closer to the end of the book it will delve into the internals of specific algorithms. In this way, readers who want to know the details can study those (and can even read the later chapter early, out of the normal sequence), but it will not unnecessarily burden readers who, like most users, will never get closer to cryptography than an encrypt() function. One strength of SiC4 has been its sidebars. Readers enjoy the brief examples of real life exploits. Fortunately, the news is full of stories of security failures, and it is important to connect these actual events to the strong pedagogy of the book. ACS, which was organized around attacks of different types, include many timely incident stories that we can pull into SiC5. Cloud computing and mobile code and computing are not covered extensively in SiC4. Cloud computing appears as a six page interlude in ACS, but in the few years since ACS was written, the use of cloud computing has expanded, as well as the security ramifications. We intend to devote an entire chapter to cloud computing. Similarly, mobile code and mobile computing have grown. These topics appeared briefly in SiC4 and ACS, but we plan to expand mobile computing into its own chapter, as well. The topic progression of SiC4 largely followed its predecessor editions, back to the first edition (1988). In 1988 networking was certainly neither as important nor pervasive as it has become. Trying to defer all coverage of network topics until Chapter 7, its position in SiC4 delays important content significantly and, perhaps more importantly, makes for a long and broad network security chapter. In 1988 readers had less direct contact with a network than now, and these readers had limited experience using a network prior to reading the book. Obviously readers in 2014 come with vastly more network exposure. This exposure is an asset: Readers now can appreciate a network-delivered attack even before they study network security. SiC5 will take advantage of readers' familiarity with networks, and present attacks delivered by a network-assisted attacker based on the primary source of vulnerability -- software, operating system, protocol, user error -- and not defer these topics to the networks chapter just because a network was involved in the attack. Finally, privacy has been an important topic in the book in early editions, and its importance and coverage have grown as well. The authors will again expand the coverage of privacy, expanding on topics such as web tracking and social networking. These additions cannot come without some pruning. Previously hot topics, such as trusted operating systems and multilevel databases, are being pared down. The authors will also reconsider topics such as economics and management which, although interesting and important, appeal to a relatively small target audience. - Publisher."@en ;
    schema:description "Introduction -- Toolbox : authentication, access control, and cryptography -- Programs and programming -- The Web : user side -- Operating systems -- Networks -- Databases -- Cloud computing -- Privacy -- Management and incidents -- Legal issues and ethics -- Details of cryptography -- Emerging topics."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/6393102> ;
    schema:inLanguage "en" ;
    schema:name "Security in computing"@en ;
    schema:productID "893452682" ;
    schema:workExample <http://worldcat.org/isbn/9780134085043> ;
    schema:workExample <http://worldcat.org/isbn/9780134085098> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB4D2813> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/893452682> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/6393102#Person/margulies_jonathan> # Jonathan Margulies
    a schema:Person ;
    schema:familyName "Margulies" ;
    schema:givenName "Jonathan" ;
    schema:name "Jonathan Margulies" ;
    .

<http://experiment.worldcat.org/entity/work/data/6393102#Person/pfleeger_charles_p_1948> # Charles P. Pfleeger
    a schema:Person ;
    schema:birthDate "1948" ;
    schema:familyName "Pfleeger" ;
    schema:givenName "Charles P." ;
    schema:name "Charles P. Pfleeger" ;
    .

<http://experiment.worldcat.org/entity/work/data/6393102#Person/pfleeger_shari_lawrence> # Shari Lawrence Pfleeger
    a schema:Person ;
    schema:familyName "Pfleeger" ;
    schema:givenName "Shari Lawrence" ;
    schema:name "Shari Lawrence Pfleeger" ;
    .

<http://experiment.worldcat.org/entity/work/data/6393102#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/6393102#Topic/privacy_right_of> # Privacy, Right of
    a schema:Intangible ;
    schema:name "Privacy, Right of"@en ;
    .

<http://worldcat.org/isbn/9780134085043>
    a schema:ProductModel ;
    schema:isbn "0134085043" ;
    schema:isbn "9780134085043" ;
    .

<http://worldcat.org/isbn/9780134085098>
    a schema:ProductModel ;
    schema:isbn "0134085094" ;
    schema:isbn "9780134085098" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.