Cover image for Security in computing
Title:
Security in computing
Author:
Pfleeger, Charles P., 1948-
ISBN:
9780133374865
Personal Author:
Edition:
2nd ed.
Publication Information:
Upper Saddle River, NJ : Prentice Hall PTR, c1997.
Physical Description:
xviii, 574 p. : ill. ; 24 cm.
Contents:
1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in General-Purpose Operating Systems -- 7. Designing Trusted Operating Systems -- 8. Data Base Security -- 9. Security in Networks and Distributed Systems -- 10. Administering Security -- 11. Legal and Ethical Issues in Computer Security.
Abstract:
Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired.
Copies: