Features
Hallmark features of this title
- Hacking exercises help students gain an understanding of issues in intrusion detection and prevention.
- Laboratory exercises involve programming and experimenting with concepts from the book. Programming projects cover a broad range of topics that can be implemented in any language on any platform.
- Security education projects cover a range of security topics. Practical security assessment exercises examine current infrastructure and practices of an existing organization.
- Firewall projects include a portable network firewall visualization simulator with exercises for teaching the fundamentals of firewalls.
- Real-world case studies include learning objectives, case descriptions and discussion questions.
- Visit the companion website at www.pearsonhighered.com/stallings to view all resources for this title.
- Copyright 2024
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 920
- Edition: 5th
-
Book
- ISBN-10: 0-13-809167-6
- ISBN-13: 978-0-13-809167-5
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material. Hacking and lab exercises, real-world case studies, and security assessments further your understanding of text concepts.
This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed.
Table of Contents
- Overview
- Cryptographic Tools
- User Authentication
- Access Control
- Database and Data Center Security
- Malicious Software
- Denial-of-Service Attacs
- Intrusion Detection
- Firewalls and Intrusion Prevention Systems
- Buffer Overflow
- Software Security
- Operating Systems Security
- Cloud and IoT Security
- IT Security Management and Risk Assessment
- IT Security Controls, plans, and Procedures
- Physical and Infrastructure Security
- Human Resources Security
- Security Auiditing
- Legal and Ethical Aspects
- Symmetric Encryption and Message Confidentiality
- Public-Key Cryptography and Message Authentication
- Internet Security Protocols and Standards
- Internet Authentication Applications
- Wireless Network Security
APPENDICES
- Projects and Other Student Exercises for Teaching Computer Security
- Some Aspects of Number Theory
- Standards and Standard-Setting Organizations
- Random and Pseudorandom Number Generation
- Message Authentication Codes Based on Block Ciphers
- The TCP/IP Protocol Architecture
- Radix-64 Conversion
- The Domain Name System
- The Base Rate Fallacy
- SHA-3 814
- Glossary