会员   密码 您忘记密码了吗?
1,570,843 本书已上架      购物流程 | 常见问题 | 联系我们 | 关于我们 | 用户协议

有店 App


当前分类

浏览历史

当前位置: 首页 > 专业/教科书/政府出版品 > 电机信息类 > COMPUTER SECURITY: PRINCIPLES AND PRACTICE 3/E (GE)
COMPUTER SECURITY: PRINCIPLES AND PRACTICE 3/E (GE)
上一张
下一张
prev next

COMPUTER SECURITY: PRINCIPLES AND PRACTICE 3/E (GE)

作者: STALLINGS
出版社: 全華圖書
出版日期: 2014-10-28
商品库存: 点击查询库存
以上库存为海外库存属流动性。
可选择“空运”或“海运”配送,空运费每件商品是RM14。
配送时间:空运约8~12个工作天,海运约30个工作天。
(以上预计配送时间不包括出版社库存不足需调货及尚未出版的新品)
定价:   NT1120.00
市场价格: RM170.37
本店售价: RM151.63
购买数量:
collect Add to cart Add booking
详细介绍 商品属性 商品标记
內容簡介

  In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.

  It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.

  The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.

  Teaching and Learning Experience

  This program presents a better teaching and learning experience—for you and your students. It will help:

  1.Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective.

  2.Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security.

  3.Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material.

  4.Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.


作者介紹


目錄

Ch0: Guide for Readers and Instructors
Ch1: Overview

PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Ch2: Cryptographic Tools
Ch3: User Authentication
Ch4: Access Control
Ch5: Database and Cloud Security
Ch6: Malicious Software
Ch7: Denial-of-Service Attacks
Ch8: Intrusion Detection
Ch9: Firewalls and Intrusion Prevention Systems

PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS
Ch10: Buffer Overflow
Ch11: Software Security
Ch12: Operating System Security
Ch13: Trusted Computing and Multilevel Security

PART THREE MANAGEMENT ISSUES
Ch14: IT Security Management and Risk Assessment
Ch15: IT Security Controls, Plans and Procedures
Ch16: Physical and Infrastructure Security
Ch17: Human Resources Security
Ch18: Security Auditing
Ch19 : Legal and Ethical Aspects

PART FOUR CRYPTOGRAPHIC ALGORITHMS
Ch20: Symmetric Encryption and Message Confidentiality
Ch21: Public-Key Cryptography and Message Authentication

PART FIVE NETWORK SECURITY
Ch22: Internet Security Protocols and Standards
Ch23 : Internet Authentication Applications
Ch24: Wireless Network Security
APPENDICES
Appendix A Projects and Other Student Exercises for Teaching Computer Security
REFERENCES
INDEX
LIST OF ACRONYMS

ONLINE CHAPTERS AND APPENDICES
Online chapters, appendices, and other documents are Premium Content, available via the access card printed in the front of the book.

Ch25: Linux Security
Ch26: Windows and Windows Vista Security
Appendix B Some Aspects of Number Theory
Appendix C Standards and Standard-Setting Organizations
Appendix D Random and Pseudorandom Number Generation
Appendix E Message Authentication Codes Based on Block Ciphers
Appendix F TCP/IP Protocol Architecture
Appendix G Radix-64 Conversion
Appendix H Security Policy-Related Documents
Appendix I The Domain Name System
Appendix J The Base-Rate Fallacy
Appendix K SHA-3
Appendix L Glossary