Security in computing /
Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-...
Збережено в:
| Автор: | |
|---|---|
| Формат: | Книга |
| Мова: | English |
| Опубліковано: |
Upper Saddle River, N.J. :
Prentice Hall PTR,
c1997.
|
| Редагування: | 2nd ed. |
| Предмети: |
| Резюме: | Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired. |
|---|---|
| Фізичний опис: | xviii, 574 p. : ill. ; 24 cm. |
| Бібліографія: | Includes bibliographical references (p. 537-559) and index. |
| ISBN: | 0133374866 (pbk.) |