Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Computer security : (Record no. 7337)

MARC details
000 -LEADER
fixed length control field 13311cam a2200469 i 4500
001 - CONTROL NUMBER
control field 16924159
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210427105946.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110817s2012 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011029651
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780273764496 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0273764497 (alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S685 2012
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number S.W.C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
245 10 - TITLE STATEMENT
Title Computer security :
Remainder of title principles and practice /
Statement of responsibility, etc William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard.
250 ## - EDITION STATEMENT
Edition statement Second Edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Boston :
Name of publisher, distributor, etc Pearson,
Date of publication, distribution, etc c2012.
300 ## - PHYSICAL DESCRIPTION
Extent 810 pages. :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. 756-773) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 0 Reader’s and Instructor’s Guide 1<br/>0.1 Outline of This Book 2<br/>0.2 A Roadmap for Readers and Instructors 2<br/>0.3 Support for CISSP Certification 3<br/>0.4 Internet and Web Resources 5<br/>0.5 Standards 7<br/>Chapter 1 Overview 9<br/>1.1 Computer Security Concepts 10<br/>1.2 Threats, Attacks, and Assets 18<br/>1.3 Security Functional Requirements 23<br/>1.4 A Security Architecture for Open Systems 26<br/>1.5 Computer Security Trends 31<br/>1.6 Computer Security Strategy 33<br/>1.7 Recommended Reading and Web Sites 35<br/>1.8 Key Terms, Review Questions, and Problems 36<br/>PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38<br/>Chapter 2 Cryptographic Tools 38<br/>2.1 Confidentiality with Symmetric Encryption 39<br/>2.2 Message Authentication and Hash Functions 46<br/>2.3 Public-Key Encryption 54<br/>2.4 Digital Signatures and Key Management 59<br/>2.5 Random and Pseudorandom Numbers 62<br/>2.6 Practical Application: Encryption of Stored Data 64<br/>2.7 Recommended Reading and Web Sites 66<br/>2.8 Key Terms, Review Questions, and Problems 67<br/>Chapter 3 User Authentication 71<br/>3.1 Means of Authentication 73<br/>3.2 Password-Based Authentication 73<br/>3.3 Token-Based Authentication 84<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 3.4 Biometric Authentication 88<br/>3.5 Remote User Authentication 93<br/>3.6 Security Issues for User Authentication 95<br/>3.7 Practical Application: An Iris Biometric System 97<br/>3.8 Case Study: Security Problems for ATM Systems 99<br/>3.9 Recommended Reading and Web Sites 101<br/>3.10 Key Terms, Review Questions, and Problems 103<br/>Chapter 4 Access Control 105<br/>4.1 Access Control Principles 106<br/>4.2 Subjects, Objects, and Access Rights 110<br/>4.3 Discretionary Access Control 111<br/>4.4 Example: UNIX File Access Control 118<br/>4.5 Role-Based Access Control 121<br/>4.6 Case Study: RBAC System for a Bank 129<br/>4.7 Recommended Reading and Web Site 132<br/>4.8 Key Terms, Review Questions, and Problems 133<br/>Chapter 5 Database Security 137<br/>5.1 The Need for Database Security 138<br/>5.2 Database Management Systems 139<br/>5.3 Relational Databases 141<br/>5.4 Database Access Control 144<br/>5.5 Inference 149<br/>5.6 Statistical Databases 152<br/>5.7 Database Encryption 162<br/>5.8 Cloud Security 166<br/>5.9 Recommended Reading and Web Site 172<br/>5.10 Key Terms, Review Questions, and Problems 173<br/>Chapter 6 Malicious Software 178<br/>6.1 Types of Malicious Software (Malware) 179<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 6.2 Propagation–Infected Content–Viruses 182<br/>6.3 Propagation–Vulnerability Exploit–Worms 188<br/>6.4 Propagation–Social Engineering–SPAM E-mail, Trojans 195<br/>6.5 Payload–System Corruption 197<br/>6.6 Payload–Attack Agent–Zombie, Bots 199<br/>6.7 Payload–Information Theft–Keyloggers, Phishing, Spyware 201<br/>6.8 Payload–Stealthing–Backdoors, Rootkits 202<br/>6.9 Countermeasures 206<br/>6.10 Recommended Reading and Web Sites 215<br/>6.11 Key Terms, Review Questions, and Problems 216<br/>Chapter 7 Denial-of-Service Attacks 220<br/>7.1 Denial-of-Service Attacks 221<br/>7.2 Flooding Attacks 228<br/>7.3 Distributed Denial-of-Service Attacks 230<br/>7.4 Application-Based Bandwidth Attacks 232<br/>7.5 Reflector and Amplifier Attacks 234<br/>7.6 Defenses Against Denial-of-Service Attacks 239<br/>7.7 Responding to a Denial-of-Service Attack 243<br/>7.8 Recommended Reading and Web Sites 244<br/>7.9 Key Terms, Review Questions, and Problems 245<br/>Chapter 8 Intrusion Detection 248<br/>8.1 Intruders 249<br/>8.2 Intrusion Detection 253<br/>8.3 Host-Based Intrusion Detection 256<br/>8.4 Distributed Host-Based Intrusion Detection 263<br/>8.5 Network-Based Intrusion Detection 265<br/>8.6 Distributed Adaptive Intrusion Detection 270<br/>8.7 Intrusion Detection Exchange Format 273<br/>8.8 Honeypots 275<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 8.9 Example System: Snort 277<br/>8.10 Recommended Reading and Web Sites 281<br/>8.11 Key Terms, Review Questions, and Problems 282<br/>Chapter 9 Firewalls and Intrusion Prevention Systems 285<br/>9.1 The Need for Firewalls 286<br/>9.2 Firewall Characteristics 287<br/>9.3 Types of Firewalls 288<br/>9.4 Firewall Basing 296<br/>9.5 Firewall Location and Configurations 298<br/>9.6 Intrusion Prevention Systems 303<br/>9.7 Example: Unified Threat Management Products 306<br/>9.8 Recommended Reading and Web Site 310<br/>9.9 Key Terms, Review Questions, and Problems 311<br/>PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS 316<br/>Chapter 10 Buffer Overflow 316<br/>10.1 Stack Overflows 318<br/>10.2 Defending Against Buffer Overflows 339<br/>10.3 Other Forms of Overflow Attacks 345<br/>10.4 Recommended Reading and Web Sites 352<br/>10.5 Key Terms, Review Questions, and Problems 353<br/>Chapter 11 Software Security 355<br/>11.1 Software Security Issues 356<br/>11.2 Handling Program Input 360<br/>11.3 Writing Safe Program Code 371<br/>11.4 Interacting with the Operating System and Other Programs 376<br/>11.5 Handling Program Output 389<br/>11.6 Recommended Reading and Web Sites 391<br/>11.7 Key Terms, Review Questions, and Problems 392<br/>Chapter 12 Operating System Security 396<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 12.1 Introduction to Operating System Security 398<br/>12.2 System Security Planning 399<br/>12.3 Operating Systems Hardening 399<br/>12.4 Application Security 404<br/>12.5 Security Maintenance 405<br/>12.6 Linux/Unix Security 406<br/>12.7 Windows Security 410<br/>12.8 Virtualization Security 412<br/>12.9 Recommended Reading and Web Sites 416<br/>12.10 Key Terms, Review Questions, and Problems 417<br/>Chapter 13 Trusted Computing and Multilevel Security 420<br/>13.1 The Bell-LaPadula Model for Computer Security 421<br/>13.2 Other Formal Models for Computer Security 431<br/>13.3 The Concept of Trusted Systems 437<br/>13.4 Application of Multilevel Security 440<br/>13.5 Trusted Computing and the Trusted Platform Module 447<br/>13.6 Common Criteria for Information Technology Security Evaluation 451<br/>13.7 Assurance and Evaluation 457<br/>13.8 Recommended Reading and Web Sites 462<br/>13.9 Key Terms, Review Questions, and Problems 463<br/>PART THREE: MANAGEMENT ISSUES 466<br/>Chapter 14 IT Security Management and Risk Assessment 466<br/>14.1 IT Security Management 467<br/>14.2 Organizational Context and Security Policy 470<br/>14.3 Security Risk Assessment 473<br/>14.4 Detailed Security Risk Analysis 476<br/>14.5 Case Study: Silver Star Mines 488<br/>14.6 Recommended Reading and Web Sites 493<br/>14.7 Key Terms, Review Questions, and Problems 494<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 15 IT Security Controls, Plans, and Procedures 497<br/>15.1 IT Security Management Implementation 498<br/>15.2 Security Controls or Safeguards 498<br/>15.3 IT Security Plan 506<br/>15.4 Implementation of Controls 507<br/>15.5 Implementation Follow-up 508<br/>15.6 Case Study: Silver Star Mines 511<br/>15.7 Recommended Reading 514<br/>15.8 Key Terms, Review Questions, and Problems 514<br/>Chapter 16 Physical and Infrastructure Security 516<br/>16.1 Overview 517<br/>16.2 Physical Security Threats 518<br/>16.3 Physical Security Prevention and Mitigation Measures 525<br/>16.4 Recovery from Physical Security Breaches 528<br/>16.5 Example: A Corporate Physical Security Policy 529<br/>16.6 Integration of Physical and Logical Security 529<br/>16.7 Recommended Reading and Web Sites 536<br/>16.8 Key Terms, Review Questions, and Problems 537<br/>Chapter 17 Human Resources Security 539<br/>17.1 Security Awareness, Training, and Education 540<br/>17.2 Employment Practices and Policies 546<br/>17.3 E-Mail and Internet Use Policies 549<br/>17.4 Computer Security Incident Response Teams 550<br/>17.5 Recommended Reading and Web Sites 557<br/>17.6 Key Terms, Review Questions, and Problems 558<br/>Chapter 18 Security Auditing 560<br/>18.1 Security Auditing Architecture 562<br/>18.2 The Security Audit Trail 567<br/>18.3 Implementing the Logging Function 571<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 18.4 Audit Trail Analysis 583<br/>18.5 Example: An Integrated Approach 587Chapter 19 Legal and Ethical Aspects 593<br/>19.1 Cybercrime and Computer Crime 594<br/>19.2 Intellectual Property 598<br/>19.3 Privacy 605<br/>19.4 Ethical Issues 611<br/>19.5 Recommended Reading and Web Sites 618<br/>19.6 Key Terms, Review Questions, and Problems 620<br/>PART FOUR CRYPTOGRAPHIC ALGORITHMS 623<br/>Chapter 20 Symmetric Encryption and Message Confidentiality 623<br/>20.1 Symmetric Encryption Principles 624<br/>20.2 Data Encryption Standard 629<br/>20.3 Advanced Encryption Standard 631<br/>20.4 Stream Ciphers and RC4 637<br/>20.5 Cipher Block Modes of Operation 640<br/>20.6 Location of Symmetric Encryption Devices 646<br/>20.7 Key Distribution 648<br/>20.8 Recommended Reading and Web Sites 650<br/>20.9 Key Terms, Review Questions, and Problems 650<br/>Chapter 21 Public-Key Cryptography and Message Authentication 655<br/>21.1 Secure Hash Functions 656<br/>21.2 HMAC 662<br/>21.3 The RSA Public-Key Encryption Algorithm 665<br/>21.4 Diffie-Hellman and Other Asymmetric Algorithms 671<br/>21.5 Recommended Reading and Web Sites 676<br/>21.6 Key Terms, Review Questions, and Problems 676<br/>PART FIVE NETWORK SECURITY 680<br/>Chapter 22 Internet Security Protocols and Standards 680<br/>22.1 Secure E-mail and S/MIME 681<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 22.2 DomainKeys Identified Mail 684<br/>22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 688<br/>22.4 HTTPS 692<br/>22.5 IPv4 and IPv6 Security 699<br/>22.6 Recommended Reading and Web Sites 699<br/>22.7 Key Terms, Review Questions, and Problems 700<br/>Chapter 23 Internet Authentication Applications 703<br/>23.1 Kerberos 704<br/>23.2 X.509 710<br/>23.3 Public-Key Infrastructure 713<br/>23.4 Federated Identity Management 715<br/>23.5 Recommended Reading and Web Sites 719<br/>23.6 Key Terms, Review Questions, and Problems 720<br/>Chapter 24 Wireless Network Security 722<br/>24.1 Wireless Security Overview 723<br/>24.2 IEEE 802.11 Wireless LAN Overview 726<br/>24.3 IEEE 802.11i Wireless LAN Security 732<br/>24.4 Recommended Reading and Web Sites 746<br/>24.5 Key Terms, Review Questions, and Problems 747<br/>APPENDICES<br/>Appendix A Projects and Other Student Exercises for Teaching Computer Security 750<br/>A.1 Hacking Project 751<br/>A.2 Laboratory Exercises 752<br/>A.3 Research Projects 752<br/>A.4 Programming Projects 753<br/>A.5 Practical Security Assessments 753<br/>A.6 Firewall Projects 754<br/>A.7 Case Studies 754<br/>A.8 Writing Assignments 754<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note A.9 Reading/Report Assignments 755<br/>References 756<br/>Index 774<br/>Credits 787<br/><br/>ONLINE CHAPTERS AND APPENDICES (Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of the book.)<br/>Chapter 25 Linux Security<br/>25.1 Introduction<br/>25.2 Linux’s Security Model<br/>25.3 The Linux DAC in Depth: Filesystem Security<br/>25.4 Linux Vulnerabilities<br/>25.5 Linux System Hardening<br/>25.6 Application Security<br/>25.7 Mandatory Access Controls<br/>25.8 Recommended Reading and Web Sites<br/>25.9 Key Terms, Review Questions, and Problems<br/>Chapter 26 Windows and Windows Vista Security<br/>26.1 Windows Security Architecture<br/>26.2 Windows Vulnerabilities<br/>26.3 Windows Security Defenses<br/>26.4 Browser Defenses<br/>26.5 Cryptographic Services<br/>26.6 Common Criteria<br/>26.7 Recommended Reading and Web Sites<br/>26.8 Key Terms, Review Questions, Problems, and Projects<br/>Appendix B Some Aspects of Number Theory<br/>B.1 Prime and Relatively Prime Numbers<br/>B.2 Modular Arithmetic<br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note B.3 Fermat’s and Euler’s Theorems<br/>Appendix C Standards and Standard-Setting Organizations<br/>C.1 The Importance of Standards<br/>C.2 Internet Standards and the Internet Society<br/>C.3 National Institute of Standards and Technology<br/>C.4 The International Telecommunication Union<br/>C.5 The International Organization for Standardization<br/>C.6 Significant Security Standards and Documents<br/>Appendix D Random and Pseudorandom Number Generation<br/>D.1 The Use of Random Numbers<br/>D.2 Pseudorandom Number Generators (PRNGs)<br/>D.3 True Random Number Generators<br/>D.4 References<br/>Appendix E Message Authentication Codes Based on Block Ciphers<br/>E.1 Cipher-Based Message Authentication Code (CMAC)<br/>E.2 Counter with Cipher Block Chaining-Message Authentication Code<br/>Appendix F TCP/IP Protocol Architecture<br/>F.1 TCP/IP Layers<br/>F.2 TCP and UDP<br/>F.3 Operation of TCP/IP<br/>F.4 TCP/IP Applications<br/>Appendix G Radix-64 Conversion<br/>Appendix H Security Policy-Related Documents<br/>H.1 A Company’s Physical and Environmental Security Policy<br/>H.2 Security Policy Standard of Good Practice<br/>H.3 Security Awareness Standard of Good Practice<br/>H.4 Information Privacy Standard of Good Practice<br/>H.5 Incident Handling Standard of Good Practice Appendix<br/>I The Domain Name System<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Electronic data processing personnel
General subdivision Certification
Form subdivision Study guides.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Brown, Lawrie.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Total Renewals Full call number Barcode Date last seen Date checked out Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 01/01/2013 MERIC 547.00 PU 1 4 005.8 S.W.C 00009655 19/02/2025 10/11/2013 01/01/2013 Books