MARC details
| 000 -LEADER |
| fixed length control field |
13311cam a2200469 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
16924159 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210427105946.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
110817s2012 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2011029651 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780273764496 (alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0273764497 (alk. paper) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Transcribing agency |
DLC |
| Modifying agency |
DLC |
| Description conventions |
rda |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
S685 2012 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
S.W.C |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Stallings, William. |
| 245 10 - TITLE STATEMENT |
| Title |
Computer security : |
| Remainder of title |
principles and practice / |
| Statement of responsibility, etc |
William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Second Edition. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Boston : |
| Name of publisher, distributor, etc |
Pearson, |
| Date of publication, distribution, etc |
c2012. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
810 pages. : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references (p. 756-773) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 0 Reader’s and Instructor’s Guide 1<br/>0.1 Outline of This Book 2<br/>0.2 A Roadmap for Readers and Instructors 2<br/>0.3 Support for CISSP Certification 3<br/>0.4 Internet and Web Resources 5<br/>0.5 Standards 7<br/>Chapter 1 Overview 9<br/>1.1 Computer Security Concepts 10<br/>1.2 Threats, Attacks, and Assets 18<br/>1.3 Security Functional Requirements 23<br/>1.4 A Security Architecture for Open Systems 26<br/>1.5 Computer Security Trends 31<br/>1.6 Computer Security Strategy 33<br/>1.7 Recommended Reading and Web Sites 35<br/>1.8 Key Terms, Review Questions, and Problems 36<br/>PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38<br/>Chapter 2 Cryptographic Tools 38<br/>2.1 Confidentiality with Symmetric Encryption 39<br/>2.2 Message Authentication and Hash Functions 46<br/>2.3 Public-Key Encryption 54<br/>2.4 Digital Signatures and Key Management 59<br/>2.5 Random and Pseudorandom Numbers 62<br/>2.6 Practical Application: Encryption of Stored Data 64<br/>2.7 Recommended Reading and Web Sites 66<br/>2.8 Key Terms, Review Questions, and Problems 67<br/>Chapter 3 User Authentication 71<br/>3.1 Means of Authentication 73<br/>3.2 Password-Based Authentication 73<br/>3.3 Token-Based Authentication 84<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
3.4 Biometric Authentication 88<br/>3.5 Remote User Authentication 93<br/>3.6 Security Issues for User Authentication 95<br/>3.7 Practical Application: An Iris Biometric System 97<br/>3.8 Case Study: Security Problems for ATM Systems 99<br/>3.9 Recommended Reading and Web Sites 101<br/>3.10 Key Terms, Review Questions, and Problems 103<br/>Chapter 4 Access Control 105<br/>4.1 Access Control Principles 106<br/>4.2 Subjects, Objects, and Access Rights 110<br/>4.3 Discretionary Access Control 111<br/>4.4 Example: UNIX File Access Control 118<br/>4.5 Role-Based Access Control 121<br/>4.6 Case Study: RBAC System for a Bank 129<br/>4.7 Recommended Reading and Web Site 132<br/>4.8 Key Terms, Review Questions, and Problems 133<br/>Chapter 5 Database Security 137<br/>5.1 The Need for Database Security 138<br/>5.2 Database Management Systems 139<br/>5.3 Relational Databases 141<br/>5.4 Database Access Control 144<br/>5.5 Inference 149<br/>5.6 Statistical Databases 152<br/>5.7 Database Encryption 162<br/>5.8 Cloud Security 166<br/>5.9 Recommended Reading and Web Site 172<br/>5.10 Key Terms, Review Questions, and Problems 173<br/>Chapter 6 Malicious Software 178<br/>6.1 Types of Malicious Software (Malware) 179<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
6.2 Propagation–Infected Content–Viruses 182<br/>6.3 Propagation–Vulnerability Exploit–Worms 188<br/>6.4 Propagation–Social Engineering–SPAM E-mail, Trojans 195<br/>6.5 Payload–System Corruption 197<br/>6.6 Payload–Attack Agent–Zombie, Bots 199<br/>6.7 Payload–Information Theft–Keyloggers, Phishing, Spyware 201<br/>6.8 Payload–Stealthing–Backdoors, Rootkits 202<br/>6.9 Countermeasures 206<br/>6.10 Recommended Reading and Web Sites 215<br/>6.11 Key Terms, Review Questions, and Problems 216<br/>Chapter 7 Denial-of-Service Attacks 220<br/>7.1 Denial-of-Service Attacks 221<br/>7.2 Flooding Attacks 228<br/>7.3 Distributed Denial-of-Service Attacks 230<br/>7.4 Application-Based Bandwidth Attacks 232<br/>7.5 Reflector and Amplifier Attacks 234<br/>7.6 Defenses Against Denial-of-Service Attacks 239<br/>7.7 Responding to a Denial-of-Service Attack 243<br/>7.8 Recommended Reading and Web Sites 244<br/>7.9 Key Terms, Review Questions, and Problems 245<br/>Chapter 8 Intrusion Detection 248<br/>8.1 Intruders 249<br/>8.2 Intrusion Detection 253<br/>8.3 Host-Based Intrusion Detection 256<br/>8.4 Distributed Host-Based Intrusion Detection 263<br/>8.5 Network-Based Intrusion Detection 265<br/>8.6 Distributed Adaptive Intrusion Detection 270<br/>8.7 Intrusion Detection Exchange Format 273<br/>8.8 Honeypots 275<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
8.9 Example System: Snort 277<br/>8.10 Recommended Reading and Web Sites 281<br/>8.11 Key Terms, Review Questions, and Problems 282<br/>Chapter 9 Firewalls and Intrusion Prevention Systems 285<br/>9.1 The Need for Firewalls 286<br/>9.2 Firewall Characteristics 287<br/>9.3 Types of Firewalls 288<br/>9.4 Firewall Basing 296<br/>9.5 Firewall Location and Configurations 298<br/>9.6 Intrusion Prevention Systems 303<br/>9.7 Example: Unified Threat Management Products 306<br/>9.8 Recommended Reading and Web Site 310<br/>9.9 Key Terms, Review Questions, and Problems 311<br/>PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS 316<br/>Chapter 10 Buffer Overflow 316<br/>10.1 Stack Overflows 318<br/>10.2 Defending Against Buffer Overflows 339<br/>10.3 Other Forms of Overflow Attacks 345<br/>10.4 Recommended Reading and Web Sites 352<br/>10.5 Key Terms, Review Questions, and Problems 353<br/>Chapter 11 Software Security 355<br/>11.1 Software Security Issues 356<br/>11.2 Handling Program Input 360<br/>11.3 Writing Safe Program Code 371<br/>11.4 Interacting with the Operating System and Other Programs 376<br/>11.5 Handling Program Output 389<br/>11.6 Recommended Reading and Web Sites 391<br/>11.7 Key Terms, Review Questions, and Problems 392<br/>Chapter 12 Operating System Security 396<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
12.1 Introduction to Operating System Security 398<br/>12.2 System Security Planning 399<br/>12.3 Operating Systems Hardening 399<br/>12.4 Application Security 404<br/>12.5 Security Maintenance 405<br/>12.6 Linux/Unix Security 406<br/>12.7 Windows Security 410<br/>12.8 Virtualization Security 412<br/>12.9 Recommended Reading and Web Sites 416<br/>12.10 Key Terms, Review Questions, and Problems 417<br/>Chapter 13 Trusted Computing and Multilevel Security 420<br/>13.1 The Bell-LaPadula Model for Computer Security 421<br/>13.2 Other Formal Models for Computer Security 431<br/>13.3 The Concept of Trusted Systems 437<br/>13.4 Application of Multilevel Security 440<br/>13.5 Trusted Computing and the Trusted Platform Module 447<br/>13.6 Common Criteria for Information Technology Security Evaluation 451<br/>13.7 Assurance and Evaluation 457<br/>13.8 Recommended Reading and Web Sites 462<br/>13.9 Key Terms, Review Questions, and Problems 463<br/>PART THREE: MANAGEMENT ISSUES 466<br/>Chapter 14 IT Security Management and Risk Assessment 466<br/>14.1 IT Security Management 467<br/>14.2 Organizational Context and Security Policy 470<br/>14.3 Security Risk Assessment 473<br/>14.4 Detailed Security Risk Analysis 476<br/>14.5 Case Study: Silver Star Mines 488<br/>14.6 Recommended Reading and Web Sites 493<br/>14.7 Key Terms, Review Questions, and Problems 494<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 15 IT Security Controls, Plans, and Procedures 497<br/>15.1 IT Security Management Implementation 498<br/>15.2 Security Controls or Safeguards 498<br/>15.3 IT Security Plan 506<br/>15.4 Implementation of Controls 507<br/>15.5 Implementation Follow-up 508<br/>15.6 Case Study: Silver Star Mines 511<br/>15.7 Recommended Reading 514<br/>15.8 Key Terms, Review Questions, and Problems 514<br/>Chapter 16 Physical and Infrastructure Security 516<br/>16.1 Overview 517<br/>16.2 Physical Security Threats 518<br/>16.3 Physical Security Prevention and Mitigation Measures 525<br/>16.4 Recovery from Physical Security Breaches 528<br/>16.5 Example: A Corporate Physical Security Policy 529<br/>16.6 Integration of Physical and Logical Security 529<br/>16.7 Recommended Reading and Web Sites 536<br/>16.8 Key Terms, Review Questions, and Problems 537<br/>Chapter 17 Human Resources Security 539<br/>17.1 Security Awareness, Training, and Education 540<br/>17.2 Employment Practices and Policies 546<br/>17.3 E-Mail and Internet Use Policies 549<br/>17.4 Computer Security Incident Response Teams 550<br/>17.5 Recommended Reading and Web Sites 557<br/>17.6 Key Terms, Review Questions, and Problems 558<br/>Chapter 18 Security Auditing 560<br/>18.1 Security Auditing Architecture 562<br/>18.2 The Security Audit Trail 567<br/>18.3 Implementing the Logging Function 571<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
18.4 Audit Trail Analysis 583<br/>18.5 Example: An Integrated Approach 587Chapter 19 Legal and Ethical Aspects 593<br/>19.1 Cybercrime and Computer Crime 594<br/>19.2 Intellectual Property 598<br/>19.3 Privacy 605<br/>19.4 Ethical Issues 611<br/>19.5 Recommended Reading and Web Sites 618<br/>19.6 Key Terms, Review Questions, and Problems 620<br/>PART FOUR CRYPTOGRAPHIC ALGORITHMS 623<br/>Chapter 20 Symmetric Encryption and Message Confidentiality 623<br/>20.1 Symmetric Encryption Principles 624<br/>20.2 Data Encryption Standard 629<br/>20.3 Advanced Encryption Standard 631<br/>20.4 Stream Ciphers and RC4 637<br/>20.5 Cipher Block Modes of Operation 640<br/>20.6 Location of Symmetric Encryption Devices 646<br/>20.7 Key Distribution 648<br/>20.8 Recommended Reading and Web Sites 650<br/>20.9 Key Terms, Review Questions, and Problems 650<br/>Chapter 21 Public-Key Cryptography and Message Authentication 655<br/>21.1 Secure Hash Functions 656<br/>21.2 HMAC 662<br/>21.3 The RSA Public-Key Encryption Algorithm 665<br/>21.4 Diffie-Hellman and Other Asymmetric Algorithms 671<br/>21.5 Recommended Reading and Web Sites 676<br/>21.6 Key Terms, Review Questions, and Problems 676<br/>PART FIVE NETWORK SECURITY 680<br/>Chapter 22 Internet Security Protocols and Standards 680<br/>22.1 Secure E-mail and S/MIME 681<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
22.2 DomainKeys Identified Mail 684<br/>22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 688<br/>22.4 HTTPS 692<br/>22.5 IPv4 and IPv6 Security 699<br/>22.6 Recommended Reading and Web Sites 699<br/>22.7 Key Terms, Review Questions, and Problems 700<br/>Chapter 23 Internet Authentication Applications 703<br/>23.1 Kerberos 704<br/>23.2 X.509 710<br/>23.3 Public-Key Infrastructure 713<br/>23.4 Federated Identity Management 715<br/>23.5 Recommended Reading and Web Sites 719<br/>23.6 Key Terms, Review Questions, and Problems 720<br/>Chapter 24 Wireless Network Security 722<br/>24.1 Wireless Security Overview 723<br/>24.2 IEEE 802.11 Wireless LAN Overview 726<br/>24.3 IEEE 802.11i Wireless LAN Security 732<br/>24.4 Recommended Reading and Web Sites 746<br/>24.5 Key Terms, Review Questions, and Problems 747<br/>APPENDICES<br/>Appendix A Projects and Other Student Exercises for Teaching Computer Security 750<br/>A.1 Hacking Project 751<br/>A.2 Laboratory Exercises 752<br/>A.3 Research Projects 752<br/>A.4 Programming Projects 753<br/>A.5 Practical Security Assessments 753<br/>A.6 Firewall Projects 754<br/>A.7 Case Studies 754<br/>A.8 Writing Assignments 754<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
A.9 Reading/Report Assignments 755<br/>References 756<br/>Index 774<br/>Credits 787<br/><br/>ONLINE CHAPTERS AND APPENDICES (Online chapters, appendices, and other documents are Premium Content, available via the access card at the front of the book.)<br/>Chapter 25 Linux Security<br/>25.1 Introduction<br/>25.2 Linux’s Security Model<br/>25.3 The Linux DAC in Depth: Filesystem Security<br/>25.4 Linux Vulnerabilities<br/>25.5 Linux System Hardening<br/>25.6 Application Security<br/>25.7 Mandatory Access Controls<br/>25.8 Recommended Reading and Web Sites<br/>25.9 Key Terms, Review Questions, and Problems<br/>Chapter 26 Windows and Windows Vista Security<br/>26.1 Windows Security Architecture<br/>26.2 Windows Vulnerabilities<br/>26.3 Windows Security Defenses<br/>26.4 Browser Defenses<br/>26.5 Cryptographic Services<br/>26.6 Common Criteria<br/>26.7 Recommended Reading and Web Sites<br/>26.8 Key Terms, Review Questions, Problems, and Projects<br/>Appendix B Some Aspects of Number Theory<br/>B.1 Prime and Relatively Prime Numbers<br/>B.2 Modular Arithmetic<br/> |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
B.3 Fermat’s and Euler’s Theorems<br/>Appendix C Standards and Standard-Setting Organizations<br/>C.1 The Importance of Standards<br/>C.2 Internet Standards and the Internet Society<br/>C.3 National Institute of Standards and Technology<br/>C.4 The International Telecommunication Union<br/>C.5 The International Organization for Standardization<br/>C.6 Significant Security Standards and Documents<br/>Appendix D Random and Pseudorandom Number Generation<br/>D.1 The Use of Random Numbers<br/>D.2 Pseudorandom Number Generators (PRNGs)<br/>D.3 True Random Number Generators<br/>D.4 References<br/>Appendix E Message Authentication Codes Based on Block Ciphers<br/>E.1 Cipher-Based Message Authentication Code (CMAC)<br/>E.2 Counter with Cipher Block Chaining-Message Authentication Code<br/>Appendix F TCP/IP Protocol Architecture<br/>F.1 TCP/IP Layers<br/>F.2 TCP and UDP<br/>F.3 Operation of TCP/IP<br/>F.4 TCP/IP Applications<br/>Appendix G Radix-64 Conversion<br/>Appendix H Security Policy-Related Documents<br/>H.1 A Company’s Physical and Environmental Security Policy<br/>H.2 Security Policy Standard of Good Practice<br/>H.3 Security Awareness Standard of Good Practice<br/>H.4 Information Privacy Standard of Good Practice<br/>H.5 Incident Handling Standard of Good Practice Appendix<br/>I The Domain Name System<br/> |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Examinations |
| Form subdivision |
Study guides. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures |
| -- |
Examinations |
| Form subdivision |
Study guides. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Electronic data processing personnel |
| General subdivision |
Certification |
| Form subdivision |
Study guides. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Brown, Lawrie. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |
| Source of classification or shelving scheme |
Dewey Decimal Classification |