Security in Computing

Security in Computing

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Add to Wishlist

About the Book

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems

Table of Contents:
Foreword xix Preface xxv Acknowledgments xxxi About the Authors xxxiii Chapter 1: Introduction 1 1.1 What Is Computer Security? 2 1.2 Threats 6 1.3 Harm 21 1.4 Vulnerabilities 28 1.5 Controls 28 1.6 Conclusion 31 1.7 What’s Next? 32 1.8 Exercises 34 Chapter 2: Toolbox: Authentication, Access Control, and Cryptography 36 2.1 Authentication 38 2.2 Access Control 72 2.3 Cryptography 86 2.4 Exercises 127 Chapter 3: Programs and Programming 131 3.1 Unintentional (Nonmalicious) Programming Oversights 133 3.2 Malicious Code—Malware 166 3.3 Countermeasures 196 Chapter 4: The Web—User Side 232 4.1 Browser Attacks 234 4.2 Web Attacks Targeting Users 245 4.3 Obtaining User or Website Data 260 4.4 Email Attacks 267 4.5 Conclusion 277 4.6 Exercises 278 Chapter 5: Operating Systems 280 5.1 Security in Operating Systems 280 5.2 Security in the Design of Operating Systems 308 5.3 Rootkit 329 5.4 Conclusion 338 5.5 Exercises 339 Chapter 6: Networks 341 6.1 Network Concepts 342 Part I—War on Networks: Network Security Attacks 353 6.2 Threats to Network Communications 354 6.3 Wireless Network Security 374 6.4 Denial of Service 396 6.5 Distributed Denial-of-Service 421 Part II—Strategic Defenses: Security Countermeasures 432 6.6 Cryptography in Network Security 432 6.7 Firewalls 451 6.8 Intrusion Detection and Prevention Systems 474 6.9 Network Management 489 6.10 Conclusion 496 6.11 Exercises 496 Chapter 7: Databases 501 7.1 Introduction to Databases 502 7.2 Security Requirements of Databases 507 7.3 Reliability and Integrity 513 7.4 Database Disclosure 518 7.5 Data Mining and Big Data 535 7.6 Conclusion 549 Chapter 8: Cloud Computing 551 8.1 Cloud Computing Concepts 551 8.2 Moving to the Cloud 553 8.3 Cloud Security Tools and Techniques 560 8.4 Cloud Identity Management 568 8.5 Securing IaaS 579 8.6 Conclusion 583 8.7 Exercises 584 Chapter 9: Privacy 586 9.1 Privacy Concepts 587 9.2 Privacy Principles and Policies 596 9.3 Authentication and Privacy 610 9.4 Data Mining 616 9.5 Privacy on the Web 619 9.6 Email Security 632 9.7 Privacy Impacts of Emerging Technologies 636 9.8 Where the Field Is Headed 644 9.9 Conclusion 645 9.10 Exercises 645 Chapter 10: Management and Incidents 647 10.1 Security Planning 647 10.2 Business Continuity Planning 658 10.3 Handling Incidents 662 10.4 Risk Analysis 668 10.5 Dealing with Disaster 686 10.6 Conclusion 699 10.7 Exercises 700 Chapter 11: Legal Issues and Ethics 702 11.1 Protecting Programs and Data 704 11.2 Information and the Law 717 11.3 Rights of Employees and Employers 725 11.4 Redress for Software Failures 728 11.5 Computer Crime 733 11.6 Ethical Issues in Computer Security 744 11.7 Incident Analysis with Ethics 750 Chapter 12: Details of Cryptography 768 12.1 Cryptology 769 12.2 Symmetric Encryption Algorithms 779 12.3 Asymmetric Encryption with RSA 795 12.4 Message Digests 799 12.5 Digital Signatures 802 12.6 Quantum Cryptography 807 12.7 Conclusion 811 Chapter 13: Emerging Topics 813 13.1 The Internet of Things 814 13.2 Economics 821 13.3 Electronic Voting 834 13.4 Cyber Warfare 841 13.5 Conclusion 850 Bibliography 851 Index 877


Best Sellers


Product Details
  • ISBN-13: 9780134085043
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Depth: 25
  • Height: 239 mm
  • No of Pages: 944
  • Series Title: 0005-Revised
  • Weight: 1489 gr
  • ISBN-10: 0134085043
  • Publisher Date: 19 Feb 2015
  • Binding: Hardback
  • Edition: 5
  • Language: English
  • Returnable: N
  • Spine Width: 39 mm
  • Width: 185 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Security in Computing
Pearson Education (US) -
Security in Computing
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security in Computing

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA