Security in computing /

Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-...

Volledige beschrijving

Bewaard in:
Bibliografische gegevens
Hoofdauteur: Pfleeger, Charles P., 1948-
Formaat: Boek
Taal:English
Gepubliceerd in: Upper Saddle River, N.J. : Prentice Hall PTR, c1997.
Editie:2nd ed.
Onderwerpen:
LEADER 02597cam a2200349 a 4500
001 c000397380
003 CARM
005 20140606140001.0
008 140606s1997 njua b 001 0 eng d
010 |a 96032910 
019 1 |a 46645611  |5 LACONCORD2021 
020 |a 0133374866 (pbk.) 
035 |a (OCoLC)35096116  |5 LACONCORD2021 
040 |a QCQU  |c QCQU 
050 0 0 |a QA76.9.A25  |b P45 1997 
082 0 4 |a 005.8  |2 23 
100 1 |a Pfleeger, Charles P.,  |d 1948- 
245 1 0 |a Security in computing /  |c Charles P. Pfleeger. 
250 |a 2nd ed. 
260 |a Upper Saddle River, N.J. :  |b Prentice Hall PTR,  |c c1997. 
300 |a xviii, 574 p. :  |b ill. ;  |c 24 cm. 
504 |a Includes bibliographical references (p. 537-559) and index. 
505 0 |a 1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in General-Purpose Operating Systems -- 7. Designing Trusted Operating Systems -- 8. Data Base Security -- 9. Security in Networks and Distributed Systems -- 10. Administering Security -- 11. Legal and Ethical Issues in Computer Security. 
520 |a Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Privacy, Right of. 
852 8 |b CARM  |p 0603471  |f BK 
852 8 |b SCAN  |h A3:AH14F0  |i C13016  |p 0603471  |f BK 
999 f f |i e63ded30-ec9d-54b4-bb72-346509cd4491  |s f432a455-98b1-539c-bbfb-82250fbe663f 
952 f f |p Can circulate  |a CAVAL  |b CAVAL  |c CAVAL  |d CARM 1 Store  |i book  |m 0603471 
952 f f |a CAVAL  |b CAVAL  |c CAVAL  |d Unmapped Location  |e C13016  |f A3:AH14F0  |h Other scheme