Home > Store

Computer Security: Principles and Practice, 2nd Edition

Register your product to gain access to bonus material or receive a coupon.

Computer Security: Principles and Practice, 2nd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Comprehensive treatment of user authentication and access control.
  • Unified approach to intrusion detection and firewalls – Gives students a solid understanding of the threats and countermeasures.
  • More detailed coverage of software security than other texts – Provides sufficient material on an issue vital to a complete computer security strategy.
  • Exploration of management issues – Asserts that "soft" issues are just as important as technical defenses in computer security.
  • Systematic, comprehensive discussion of malicious software and denial of service attacks (the major threats to computer systems).
  • Coverage of Linux and Windows Vista – Addresses the most widely used operating systems.
  • Up-to-date coverage of database security.
  • Thorough overview of cryptography, authentication, and digital signatures – Provides a solid yet concise overview of the fundamental algorithms and techniques underlying network security.
  • Internet security – Coverage addresses network-based issues of importance for computer security.
  • Companion Website -- Access textbook-related resources and support materials for students and instructors maintained by the author.
  • Student Resource Site -- Access a wealth of computer science-related information including mathematics reviews, how-to documents, research resources, and career explorations maintained by the author.
TEACHING/LEARNING PROGRAM
  • Extensive use of case studies and examples – Provides real-world context to the text material.
  • Unparalleled support for including a projects component with the course – The Instructor's Manual not only includes guidance on how  to assign and structure the projects, but also includes a set of suggested projects that covers a broad range of topics from the text. Four types of projects are supported in the Instructor's Manual:
    • Research Projects: A series of research assignments that instruct the student to research a particular topic on the Internet and write a report.
    • Hacking assignments: A series of hacking problems for the student to experiment with.
    • Reading/Report Assignments: A list of papers in the literature, one for each chapter, that can be assigned for the student to read and then write a short report.
    • Writing Assignments: A list of suggested writing assignments
  • A text-specific web page for student and instructor support, including:
    • Links to important sites, organized according to the chapters of the book, so that the student can visit sites related to the material currently being studied to get up-to-date and supplementary information.
    • Links to course pages by professors teaching from the book. This can give other instructors useful ideas.
    • Transparency masters of figures and tables from the book in PDF (Adobe Acrobat) format.
    • An errata sheet for the book.
    • A set of PowerPoint slides for use in lecturing
    • A set of course notes in PDF that can be used as a  handout.
    • An Internet mailing list that enables instructors using the book to exchange information, suggestions, and questions with each other and the author. Sign-up information for the mailing list is provided at the web site.
  • Numerous homework problems in a wide range of difficulty along with numerous review questions. – An Instructor's Manual contains solutions to all problems and questions.
  • Extensive use of figures and tables to clarify concepts.
  • List of key words, recommended reading list, and recommended Web sites at the end of each chapter.
  • Glossary at the end of the book.
  • List of acronyms on back endpaper.

Description

  • Copyright 2012
  • Edition: 2nd
  • Book
  • ISBN-10: 0-13-277506-9
  • ISBN-13: 978-0-13-277506-9

Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.

In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.  In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. 


The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.


Sample Content

Table of Contents

Online Resources xiii
Notation xiv
About the Authors xv
Preface xvii
Chapter 0 Reader’s and Instructor’s Guide 1
0.1 Outline of This Book 2
0.2 A Roadmap for Readers and Instructors 2
0.3 Support for CISSP Certification 3
0.4 Internet and Web Resources 5
0.5 Standards 7
Chapter 1 Overview 9
1.1 Computer Security Concepts 10
1.2 Threats, Attacks, and Assets 18
1.3 Security Functional Requirements 23
1.4 A Security Architecture for Open Systems 26
1.5 Computer Security Trends 31
1.6 Computer Security Strategy 33
1.7 Recommended Reading and Web Sites 35
1.8 Key Terms, Review Questions, and Problems 36
PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38
Chapter 2 Cryptographic Tools 38

2.1 Confidentiality with Symmetric Encryption 39
2.2 Message Authentication and Hash Functions 46
2.3 Public-Key Encryption 54
2.4 Digital Signatures and Key Management 59
2.5 Random and Pseudorandom Numbers 62
2.6 Practical Application: Encryption of Stored Data 64
2.7 Recommended Reading and Web Sites 66
2.8 Key Terms, Review Questions, and Problems 67
Chapter 3 User Authentication 71
3.1 Means of Authentication 73
3.2 Password-Based Authentication 73
3.3 Token-Based Authentication 84
3.4 Biometric Authentication 88
3.5 Remote User Authentication 93
3.6 Security Issues for User Authentication 95
3.7 Practical Application: An Iris Biometric System 97
3.8 Case Study: Security Problems for ATM Systems 99
3.9 Recommended Reading and Web Sites 101
3.10 Key Terms, Review Questions, and Problems 103
Chapter 4 Access Control 105
4.1 Access Control Principles 106
4.2 Subjects, Objects, and Access Rights 110
4.3 Discretionary Access Control 111
4.4 Example: UNIX File Access Control 118
4.5 Role-Based Access Control 121
4.6 Case Study: RBAC System for a Bank 129
4.7 Recommended Reading and Web Site 132
4.8 Key Terms, Review Questions, and Problems 133
Chapter 5 Database Security 137
5.1 The Need for Database Security 138
5.2 Database Management Systems 139
5.3 Relational Databases 141
5.4 Database Access Control 144
5.5 Inference 149
5.6 Statistical Databases 152
5.7 Database Encryption 162
5.8 Cloud Security 166
5.9 Recommended Reading and Web Site 172
5.10 Key Terms, Review Questions, and Problems 173
Chapter 6 Malicious Software 178
6.1 Types of Malicious Software (Malware) 179
6.2 Propagation–Infected Content–Viruses 182
6.3 Propagation–Vulnerability Exploit–Worms 188
6.4 Propagation–Social Engineering–SPAM E-mail, Trojans 195
6.5 Payload–System Corruption 197
6.6 Payload–Attack Agent–Zombie, Bots 199
6.7 Payload–Information Theft–Keyloggers, Phishing, Spyware 201
6.8 Payload–Stealthing–Backdoors, Rootkits 202
6.9 Countermeasures 206
6.10 Recommended Reading and Web Sites 215
6.11 Key Terms, Review Questions, and Problems 216
Chapter 7 Denial-of-Service Attacks 220
7.1 Denial-of-Service Attacks 221
7.2 Flooding Attacks 228
7.3 Distributed Denial-of-Service Attacks 230
7.4 Application-Based Bandwidth Attacks 232
7.5 Reflector and Amplifier Attacks 234
7.6 Defenses Against Denial-of-Service Attacks 239
7.7 Responding to a Denial-of-Service Attack 243
7.8 Recommended Reading and Web Sites 244
7.9 Key Terms, Review Questions, and Problems 245
Chapter 8 Intrusion Detection 248
8.1 Intruders 249
8.2 Intrusion Detection 253
8.3 Host-Based Intrusion Detection 256
8.4 Distributed Host-Based Intrusion Detection 263
8.5 Network-Based Intrusion Detection 265
8.6 Distributed Adaptive Intrusion Detection 270
8.7 Intrusion Detection Exchange Format 273
8.8 Honeypots 275
8.9 Example System: Snort 277
8.10 Recommended Reading and Web Sites 281
8.11 Key Terms, Review Questions, and Problems 282
Chapter 9 Firewalls and Intrusion Prevention Systems 285
9.1 The Need for Firewalls 286
9.2 Firewall Characteristics 287
9.3 Types of Firewalls 288
9.4 Firewall Basing 296
9.5 Firewall Location and Configurations 298
9.6 Intrusion Prevention Systems 303
9.7 Example: Unified Threat Management Products 306
9.8 Recommended Reading and Web Site 310
9.9 Key Terms, Review Questions, and Problems 311
PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS 316
Chapter 10 Buffer Overflow 316

10.1 Stack Overflows 318
10.2 Defending Against Buffer Overflows 339
10.3 Other Forms of Overflow Attacks 345
10.4 Recommended Reading and Web Sites 352
10.5 Key Terms, Review Questions, and Problems 353
Chapter 11 Software Security 355
11.1 Software Security Issues 356
11.2 Handling Program Input 360
11.3 Writing Safe Program Code 371
11.4 Interacting with the Operating System and Other Programs 376
11.5 Handling Program Output 389
11.6 Recommended Reading and Web Sites 391
11.7 Key Terms, Review Questions, and Problems 392
Chapter 12 Operating System Security 396
12.1 Introduction to Operating System Security 398
12.2 System Security Planning 399
12.3 Operating Systems Hardening 399
12.4 Application Security 404
12.5 Security Maintenance 405
12.6 Linux/Unix Security 406
12.7 Windows Security 410
12.8 Virtualization Security 412
12.9 Recommended Reading and Web Sites 416
12.10 Key Terms, Review Questions, and Problems 417
Chapter 13 Trusted Computing and Multilevel Security 420
13.1 The Bell-LaPadula Model for Computer Security 421
13.2 Other Formal Models for Computer Security 431
13.3 The Concept of Trusted Systems 437
13.4 Application of Multilevel Security 440
13.5 Trusted Computing and the Trusted Platform Module 447
13.6 Common Criteria for Information Technology Security Evaluation 451
13.7 Assurance and Evaluation 457
13.8 Recommended Reading and Web Sites 462
13.9 Key Terms, Review Questions, and Problems 463
PART THREE: MANAGEMENT ISSUES 466
Chapter 14 IT Security Management and Risk Assessment 466

14.1 IT Security Management 467
14.2 Organizational Context and Security Policy 470
14.3 Security Risk Assessment 473
14.4 Detailed Security Risk Analysis 476
14.5 Case Study: Silver Star Mines 488
14.6 Recommended Reading and Web Sites 493
14.7 Key Terms, Review Questions, and Problems 494
Chapter 15 IT Security Controls, Plans, and Procedures 497
15.1 IT Security Management Implementation 498
15.2 Security Controls or Safeguards 498
15.3 IT Security Plan 506
15.4 Implementation of Controls 507
15.5 Implementation Follow-up 508
15.6 Case Study: Silver Star Mines 511
15.7 Recommended Reading 514
15.8 Key Terms, Review Questions, and Problems 514
Chapter 16 Physical and Infrastructure Security 516
16.1 Overview 517
16.2 Physical Security Threats 518
16.3 Physical Security Prevention and Mitigation Measures 525
16.4 Recovery from Physical Security Breaches 528
16.5 Example: A Corporate Physical Security Policy 529
16.6 Integration of Physical and Logical Security 529
16.7 Recommended Reading and Web Sites 536
16.8 Key Terms, Review Questions, and Problems 537
Chapter 17 Human Resources Security 539
17.1 Security Awareness, Training, and Education 540
17.2 Employment Practices and Policies 546
17.3 E-Mail and Internet Use Policies 549
17.4 Computer Security Incident Response Teams 550
17.5 Recommended Reading and Web Sites 557
17.6 Key Terms, Review Questions, and Problems 558
Chapter 18 Security Auditing 560
18.1 Security Auditing Architecture 562
18.2 The Security Audit Trail 567
18.3 Implementing the Logging Function 571
18.4 Audit Trail Analysis 583
18.5 Example: An Integrated Approach 587
18.6 Recommended Reading and Web Site 590
18.7 Key Terms, Review Questions, and Problems 591
Chapter 19 Legal and Ethical Aspects 593
19.1 Cybercrime and Computer Crime 594
19.2 Intellectual Property 598
19.3 Privacy 605
19.4 Ethical Issues 611
19.5 Recommended Reading and Web Sites 618
19.6 Key Terms, Review Questions, and Problems 620
PART FOUR CRYPTOGRAPHIC ALGORITHMS 623
Chapter 20 Symmetric Encryption and Message Confidentiality 623

20.1 Symmetric Encryption Principles 624
20.2 Data Encryption Standard 629
20.3 Advanced Encryption Standard 631
20.4 Stream Ciphers and RC4 637
20.5 Cipher Block Modes of Operation 640
20.6 Location of Symmetric Encryption Devices 646
20.7 Key Distribution 648
20.8 Recommended Reading and Web Sites 650
20.9 Key Terms, Review Questions, and Problems 650
Chapter 21 Public-Key Cryptography and Message Authentication 655
21.1 Secure Hash Functions 656
21.2 HMAC 662
21.3 The RSA Public-Key Encryption Algorithm 665
21.4 Diffie-Hellman and Other Asymmetric Algorithms 671
21.5 Recommended Reading and Web Sites 676
21.6 Key Terms, Review Questions, and Problems 676
PART FIVE NETWORK SECURITY 680
Chapter 22 Internet Security Protocols and Standards 680

22.1 Secure E-mail and S/MIME 681
22.2 DomainKeys Identified Mail 684
22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 688
22.4 HTTPS 692
22.5 IPv4 and IPv6 Security 699
22.6 Recommended Reading and Web Sites 699
22.7 Key Terms, Review Questions, and Problems 700
Chapter 23 Internet Authentication Applications 703
23.1 Kerberos 704
23.2 X.509 710
23.3 Public-Key Infrastructure 713
23.4 Federated Identity Management 715
23.5 Recommended Reading and Web Sites 719
23.6 Key Terms, Review Questions, and Problems 720
Chapter 24 Wireless Network Security 722
24.1 Wireless Security Overview 723
24.2 IEEE 802.11 Wireless LAN Overview 726
24.3 IEEE 802.11i Wireless LAN Security 732
24.4 Recommended Reading and Web Sites 746
24.5 Key Terms, Review Questions, and Problems 747
APPENDICES
Appendix A Projects and Other Student Exercises for Teaching Computer Security 750
A.1 Hacking Project 751
A.2 Laboratory Exercises 752
A.3 Research Projects 752
A.4 Programming Projects 753
A.5 Practical Security Assessments 753
A.6 Firewall Projects 754
A.7 Case Studies 754
A.8 Writing Assignments 754
A.9 Reading/Report Assignments 755
References 756
Index 774
Credits 787

ONLINE CHAPTERS AND APPENDICES  (Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of the book.)
Chapter 25 Linux Security
25.1 Introduction
25.2 Linux’s Security Model
25.3 The Linux DAC in Depth: Filesystem Security
25.4 Linux Vulnerabilities
25.5 Linux System Hardening
25.6 Application Security
25.7 Mandatory Access Controls
25.8 Recommended Reading and Web Sites
25.9 Key Terms, Review Questions, and Problems
Chapter 26 Windows and Windows Vista Security
26.1 Windows Security Architecture
26.2 Windows Vulnerabilities
26.3 Windows Security Defenses
26.4 Browser Defenses
26.5 Cryptographic Services
26.6 Common Criteria
26.7 Recommended Reading and Web Sites
26.8 Key Terms, Review Questions, Problems, and Projects
Appendix B Some Aspects of Number Theory
B.1 Prime and Relatively Prime Numbers
B.2 Modular Arithmetic
B.3 Fermat’s and Euler’s Theorems
Appendix C Standards and Standard-Setting Organizations
C.1 The Importance of Standards
C.2 Internet Standards and the Internet Society
C.3 National Institute of Standards and Technology
C.4 The International Telecommunication Union
C.5 The International Organization for Standardization
C.6 Significant Security Standards and Documents
Appendix D Random and Pseudorandom Number Generation
D.1 The Use of Random Numbers
D.2 Pseudorandom Number Generators (PRNGs)
D.3 True Random Number Generators
D.4 References
Appendix E Message Authentication Codes Based on Block Ciphers
E.1 Cipher-Based Message Authentication Code (CMAC)
E.2 Counter with Cipher Block Chaining-Message Authentication Code
Appendix F TCP/IP Protocol Architecture
F.1 TCP/IP Layers
F.2 TCP and UDP
F.3 Operation of TCP/IP
F.4 TCP/IP Applications
Appendix G Radix-64 Conversion
Appendix H Security Policy-Related Documents
H.1 A Company’s Physical and Environmental Security Policy
H.2 Security Policy Standard of Good Practice
H.3 Security Awareness Standard of Good Practice
H.4 Information Privacy Standard of Good Practice
H.5 Incident Handling Standard of Good Practice Appendix
I The Domain Name System
I.1 Domain Names
I.2 The DNS Database
I.3 DNS Operation Appendix J The Base-Rate Fallacy
J.1 Conditional Probability and Independence
J.2 Bayes’ Theorem
J.3 The Base-Rate Fallacy Demonstrated
Appendix K Glossary

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020