Rabu, 02 Maret 2011

[U827.Ebook] PDF Download Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger

PDF Download Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger

From the combination of knowledge and actions, a person could improve their ability and ability. It will lead them to live as well as work better. This is why, the students, workers, or even companies must have reading habit for books. Any book Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger will provide certain expertise to take all perks. This is just what this Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger informs you. It will certainly include more knowledge of you to life and also work far better. Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger, Try it and also prove it.

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger



Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger

PDF Download Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger

When you are hurried of job deadline and also have no suggestion to obtain motivation, Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger publication is one of your solutions to take. Schedule Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger will certainly offer you the appropriate source and also point to get inspirations. It is not only about the works for politic business, management, economics, and also various other. Some purchased tasks making some fiction works additionally need motivations to overcome the job. As exactly what you need, this Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger will most likely be your option.

When some individuals taking a look at you while checking out Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger, you might really feel so happy. However, instead of other individuals feels you need to instil in yourself that you are reading Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger not because of that reasons. Reading this Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger will offer you more than individuals admire. It will certainly overview of understand greater than the people looking at you. Even now, there are lots of sources to discovering, reading a book Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger still becomes the front runner as a great way.

Why must be reading Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger Once again, it will certainly rely on just how you feel as well as consider it. It is certainly that one of the benefit to take when reading this Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger; you can take more lessons directly. Even you have actually not undertaken it in your life; you can obtain the experience by reviewing Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger And currently, we will certainly introduce you with the online book Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger in this website.

What type of book Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger you will prefer to? Now, you will certainly not take the published publication. It is your time to obtain soft file book Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger rather the printed records. You could enjoy this soft documents Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger in any time you expect. Even it remains in expected area as the other do, you could read the book Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger in your device. Or if you really want much more, you could continue reading your computer system or laptop computer to get complete screen leading. Juts discover it here by downloading the soft documents Security In Computing, 4th Edition, By Charles P. Pfleeger, Shari Lawrence Pfleeger in web link web page.

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger

The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.

The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses.

Security in Computing, Fourth Edition , goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.

New coverage also includes

  • Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks
  • Web application threats and vulnerabilities
  • Networks of compromised systems: bots, botnets, and drones
  • Rootkits--including the notorious Sony XCP
  • Wi-Fi network security challenges, standards, and techniques
  • New malicious code attacks, including false interfaces and keystroke loggers
  • Improving code quality: software engineering, testing, and liability approaches
  • Biometric authentication: capabilities and limitations
  • Using the Advanced Encryption System (AES) more effectively
  • Balancing dissemination with piracy control in music and other digital content
  • Countering new cryptanalytic attacks against RSA, DES, and SHA
  • Responding to the emergence of organized attacker groups pursuing profit

  • Sales Rank: #495304 in Books
  • Published on: 2006-10-23
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.53" h x 1.90" w x 7.35" l, 3.55 pounds
  • Binding: Hardcover
  • 880 pages
Features
  • Excellent security text-book

From the Publisher
A sweeping revision of the classic computer security text. This book provides end-to-end, detailed coverage of the state of the art in all aspects of computer security. Starting with a clear, in-depth review of cryptography, it also covers specific options for securing software and data against malicious code and intruders; the special challenges of securing networks and distributed systems; firewalls; ways to administer security on personal computers and UNIX systems; analyzing security risks and benefits; and the legal and ethical issues surrounding computer security.

From the Inside Flap
When the first edition of this book was published in 1989, viruses and other forms of malicious code were fairly uncommon, the Internet was used largely by just computing professionals, a Clipper was a sailing ship, and computer crime was seldom a headline topic in daily newspapers. In that era most people were unconcerned about--even unaware of--how serious is the threat to security in the use of computers.

The use of computers has spread at a rate completely unexpected back then. Now you can bank by computer, order and pay for merchandise, and even commit to contracts by computer. And the uses of computers in business have similarly increased both in volume and in richness. Alas, the security threats to computing have also increased significantly.

Why Read This Book?

Are your data and programs at risk? If you answer "yes" to any of the following questions, you have a potential security risk.

Have you acquired any new programs within the last year?

Do you use your computer to communicate electronically with other computers?

Do you ever receive programs or data from other people?

Is there any significant program or data item of which you do not have a second copy?

Relax; you are not alone. Most computer users have a security risk. Being at risk does not mean you should stop using computers. It does mean you should learn more about the risk you face, and how to control that risk.

Users and managers of large mainframe computing systems of the 1960s and l970s developed computer security techniques that were reasonably effective against the threats of that era. However, two factors have made those security procedures outdated:

Personal computer use. Vast numbers of people have become dedicated users of personal computing systems, both for business and pleasure. We try to make applications "user friendly" so that computers can be used by people who know nothing of hardware or programming, just as people who can drive a car do not need to know how to design an engine. Users may not be especially conscious of the security threats involved in computer use; even users who are aware may not know what to do to reduce their risk.

Networked remote-access systems. Machines are being linked in large numbers. The Internet and its cousin, the World-Wide Web, seem to double every year in number of users. A user of a mainframe computer may not realize that access to the same machine is allowed to people throughout the world from an almost uncountable number of computing systems.

Every computing professional must understand the threats and the countermeasures currently available in computing. This book addresses that need.

This book is designed for the student or professional in computing. Beginning at a level appropriate for an experienced computer user, this book describes the security pitfalls inherent in many important computing tasks today. Then, the book explores the controls that can check these weaknesses. The book also points out where existing controls are inadequate and serious consideration must be given to the risk present in the computing situation.

Uses of This Book

The chapters of this book progress in an orderly manner. After an introduction, the topic of encryption, the process of disguising something written to conceal its meaning, is presented as the first tool in computer security. The book continues through the different kinds of computing applications, their weaknesses, and their controls.
The applications areas include:
general programs
operating systems
data base management systems
remote access computing
multicomputer networks

These sections begin with a definition of the topic, continue with a description of the relationship of security to the topic, and conclude with a statement of the current state of the art of computer security research related to the topic. The book concludes with an examination of risk analysis and planning for computer security, and a study of the relationship of law and ethics to computer security.

Background required to appreciate the book is an understanding of programming and computer systems. Someone who is a senior or graduate student in computer science or a professional who has been in the field for a few years would have the appropriate level of understanding. Although some facility with mathematics is useful, all necessary mathematical background is developed in the book. Similarly, the necessary material on design of software systems, operating systems, data bases, or networks is given in the relevant chapters. One need not have a detailed knowledge of these areas before reading this book.

The book is designed to be a textbook for a one- or two-semester course in computer security. The book functions equally well as a reference for a computer professional. The introduction and the chapters on encryption are fundamental to the understanding of the rest of the book. After studying those pieces, however, the reader can study any of the later chapters in any order. Furthermore, many chapters follow the format of introduction, then security aspects of the topic, then current work in the area. Someone who is interested more in background than in current work can stop in the middle of one chapter and go on to the next.

This book has been used in classes throughout the world. Roughly half of the book can be covered in a semester. Therefore, an instructor can design a one-semester course that considers some of the topics of greater interest.

What Does This Book Contain?

This is the revised edition of Security in Computing. It is based largely on the previous version, with many updates to cover newer topics in computer security. Among the salient additions to the new edition are these items:

Viruses, worms, Trojan horses, and other malicious code. Complete new section (first half of Chapter 5) including sources of these kinds of code, how they are written, how they can be detected and/or prevented, and several actual examples.

Firewalls. Complete new section (end of Chapter 9) describing what they do, how they work, how they are constructed, and what degree of protection they provide.

Private e-mail. Complete new section (middle of Chapter 9) explaining exposures in e-mail, kind of protection available, PEM and PGP, key management, and certificates.

Clipper, Capstone, Tessera, Mosaic, and key escrow. Several sections, in Chapter 3 as an encryption technology, and Chapter 4 as a key management protocol, and in Chapter 11 as a privacy and ethics issue.

Trusted system evaluation. Extensive addition (in Chapter 7) including criteria from the United States, Europe, Canada, and the soon-to-be-released Common Criteria.

Program development processes, including ISO 9000 and the SEI CMM. A major section in Chapter 5 gives comparisons between these methodologies.

Guidance for administering PC, Unix, and networked environments. In addition to these major changes, there are numerous small changes, ranging from wording changes to subtle notational changes for pedagogic reasons, to replacement, deletion, rearrangement, and expansion of sections.

The focus of the book remains the same, however. This is still a book covering the complete subject of computer security. The target audience is college students (advanced undergraduates or graduate students) and professionals. A reader is expected to bring a background in general computing technology; some knowledge of programming, operating systems, and networking is expected, although advanced knowledge in those areas is not necessary. Mathematics is used as appropriate, although a student can ignore most of the mathematical foundation if he or she chooses.

Acknowledgments

Many people have contributed to the content and structure of this book. The following friends and colleagues have supplied thoughts, advice, challenges, criticism, and suggestions that have influenced my writing of this book: Lance Hoffman, Marv Schaefer, Dave Balenson, Terry Benzel, Curt Barker, Debbie Cooper, and Staffan Persson. Two people from outside the computer security community were very encouraging: Gene Davenport and Bruce Barnes. I apologize if I have forgotten to mention someone else; the oversight is accidental.

Lance Hoffman deserves special mention. He used a preliminary copy of the book in a course at George Washington University. Not only did he provide me with suggestions of his own, but his students also supplied invaluable comments from the student perspective on sections that did and did not communicate effectively. I want to thank them for their constructive criticisms.

Finally, if someone alleges to have written a book alone, distrust the person immediately. While an author is working 16-hour days on the writing of the book, someone else needs to see to all the other aspects of life, from simple things like food, clothing, and shelter, to complex things like social and family responsibilities. My wife, Shari Lawrence Pfleeger, took the time from her professional schedule so that I could devote my full energies to writing. Furthermore, she soothed me when the schedule inexplicably slipped, when the computer went down, when I had writerÕs block, or when some other crisis beset this project. On top of that, she reviewed the entire manuscript, giving the most thorough and constructive review this book has had. Her suggestions have improved the content, organization, readability, and overall quality of this book immeasurably. Therefore, it is with great pleasure that I dedicate this book to Shari, the other half of the team that caused this book to be written.

Charles P. Pfleeger Washington DC


From the Back Cover
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.

The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses.

Security in Computing, Fourth Edition , goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.

New coverage also includes

  • Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks
  • Web application threats and vulnerabilities
  • Networks of compromised systems: bots, botnets, and drones
  • Rootkits--including the notorious Sony XCP
  • Wi-Fi network security challenges, standards, and techniques
  • New malicious code attacks, including false interfaces and keystroke loggers
  • Improving code quality: software engineering, testing, and liability approaches
  • Biometric authentication: capabilities and limitations
  • Using the Advanced Encryption System (AES) more effectively
  • Balancing dissemination with piracy control in music and other digital content
  • Countering new cryptanalytic attacks against RSA, DES, and SHA
  • Responding to the emergence of organized attacker groups pursuing profit

Most helpful customer reviews

1 of 1 people found the following review helpful.
Good book for a cursory overview of Infosec
By X. Liu
I used this book for my Introduction to Information Security Management course.

Overall the book provides a good cursory overview of a lot of topics in information security. If you are looking for a book that explains a subject in depth then look elsewhere. However, if you are just getting into the field and would like to get a general idea of information security then this book is the way to go.

The book could use an update, many of the topics are still relevant but there are some areas need an overhaul.

0 of 0 people found the following review helpful.
Buy it
By R C Anderson
Good book. Recommend anyone interested in the cyber network field pick this book up. I needed it for school and had initially rented it, but ended up buying it because I felt like it would be a good reference tool in the future.

1 of 1 people found the following review helpful.
Weak, out of date
By unicityd
This book is superficial, weak, and out of date. It skips over many newer developments and the "Where the field is headed" sections often focus on research that is twenty years old. I hate to pick on the authors because writing a good book is difficult, but this book makes me doubt they have much recent experience in the field.

I had to buy this for school and plan to sell it back as soon as the quarter is over. I've stopped reading the book and now just skim the topics to make sure I brush up on any weak areas using other sources.

See all 61 customer reviews...

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger PDF
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger EPub
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger Doc
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger iBooks
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger rtf
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger Mobipocket
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger Kindle

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger PDF

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger PDF

Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger PDF
Security in Computing, 4th Edition, by Charles P. Pfleeger, Shari Lawrence Pfleeger PDF

Tidak ada komentar:

Posting Komentar