Security in computing /
Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-...
Bewaard in:
| Hoofdauteur: | |
|---|---|
| Formaat: | Boek |
| Taal: | English |
| Gepubliceerd in: |
Upper Saddle River, N.J. :
Prentice Hall PTR,
c1997.
|
| Editie: | 2nd ed. |
| Onderwerpen: |
| LEADER | 02597cam a2200349 a 4500 | ||
|---|---|---|---|
| 001 | c000397380 | ||
| 003 | CARM | ||
| 005 | 20140606140001.0 | ||
| 008 | 140606s1997 njua b 001 0 eng d | ||
| 010 | |a 96032910 | ||
| 019 | 1 | |a 46645611 |5 LACONCORD2021 | |
| 020 | |a 0133374866 (pbk.) | ||
| 035 | |a (OCoLC)35096116 |5 LACONCORD2021 | ||
| 040 | |a QCQU |c QCQU | ||
| 050 | 0 | 0 | |a QA76.9.A25 |b P45 1997 |
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 100 | 1 | |a Pfleeger, Charles P., |d 1948- | |
| 245 | 1 | 0 | |a Security in computing / |c Charles P. Pfleeger. |
| 250 | |a 2nd ed. | ||
| 260 | |a Upper Saddle River, N.J. : |b Prentice Hall PTR, |c c1997. | ||
| 300 | |a xviii, 574 p. : |b ill. ; |c 24 cm. | ||
| 504 | |a Includes bibliographical references (p. 537-559) and index. | ||
| 505 | 0 | |a 1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in General-Purpose Operating Systems -- 7. Designing Trusted Operating Systems -- 8. Data Base Security -- 9. Security in Networks and Distributed Systems -- 10. Administering Security -- 11. Legal and Ethical Issues in Computer Security. | |
| 520 | |a Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired. | ||
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Privacy, Right of. | |
| 852 | 8 | |b CARM |p 0603471 |f BK | |
| 852 | 8 | |b SCAN |h A3:AH14F0 |i C13016 |p 0603471 |f BK | |
| 999 | f | f | |i e63ded30-ec9d-54b4-bb72-346509cd4491 |s f432a455-98b1-539c-bbfb-82250fbe663f |
| 952 | f | f | |p Can circulate |a CAVAL |b CAVAL |c CAVAL |d CARM 1 Store |i book |m 0603471 |
| 952 | f | f | |a CAVAL |b CAVAL |c CAVAL |d Unmapped Location |e C13016 |f A3:AH14F0 |h Other scheme |