Computer Security: Principles and Practice 4th ediiton by William Stallings, Lawrie Brown – Ebook PDF Instant Download/Delivery. 1292220619 ,978-1292220611
Full download Computer Security: Principles and Practice 4th edition after payment

Product details:
ISBN 10: 1292220619
ISBN 13: 978-1292220611
Author: William Stallings, Lawrie Brown
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.
Computer Security: Principles and Practice 4th Table of contents:
Preface
Part I: Introduction to Computer Security
-
Introduction to Computer Security
- 1.1. What is Computer Security?
- 1.2. The Importance of Security
- 1.3. Security Terminology
- 1.4. Types of Threats
- 1.5. Security Policies, Models, and Mechanisms
- 1.6. Security Threats to Networks and Distributed Systems
-
Security Trends
- 2.1. Overview of Security Issues
- 2.2. Evolving Threats and Attacks
- 2.3. The Role of Cryptography
- 2.4. Challenges in Modern Computing Environments
Part II: Classical Encryption Techniques
-
Symmetric-Key Cryptography
- 3.1. Symmetric Encryption
- 3.2. Block Ciphers
- 3.3. Stream Ciphers
- 3.4. Cipher Modes of Operation
- 3.5. Data Encryption Standard (DES)
- 3.6. Advanced Encryption Standard (AES)
- 3.7. Key Management in Symmetric Cryptography
-
Public-Key Cryptography
- 4.1. Public-Key Cryptography Concepts
- 4.2. RSA Algorithm
- 4.3. Diffie-Hellman Key Exchange
- 4.4. Digital Signatures
- 4.5. Public-Key Infrastructure (PKI)
Part III: Authentication and Access Control
-
Authentication Basics
- 5.1. Overview of Authentication
- 5.2. Authentication Mechanisms
- 5.3. Password-based Authentication
- 5.4. Multi-factor Authentication
- 5.5. Biometric Authentication
-
Access Control Models
- 6.1. Discretionary Access Control (DAC)
- 6.2. Mandatory Access Control (MAC)
- 6.3. Role-Based Access Control (RBAC)
- 6.4. Access Control Policies and Models
- 6.5. Access Control Mechanisms and Tools
Part IV: Network Security
-
Network Security Principles
- 7.1. Overview of Network Security
- 7.2. Network Threats and Attacks
- 7.3. Secure Network Design
- 7.4. Firewalls and Intrusion Detection Systems (IDS)
-
Internet Security Protocols
- 8.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
- 8.2. IPsec (Internet Protocol Security)
- 8.3. Virtual Private Networks (VPNs)
- 8.4. Secure E-mail: PGP and S/MIME
- 8.5. DNS Security (DNSSEC)
Part V: Software and System Security
-
Operating System Security
- 9.1. OS Security Requirements
- 9.2. Protecting OS Resources
- 9.3. OS Security Models and Mechanisms
- 9.4. Security in Virtualization and Cloud Computing
-
Malware and Vulnerabilities
- 10.1. Types of Malware
- 10.2. Virus and Worm Protection
- 10.3. Trojan Horses and Backdoors
- 10.4. Buffer Overflow Attacks
- 10.5. Software Vulnerabilities and Exploits
Part VI: Risk Management and Security Policies
- Risk Management
- 11.1. Risk Analysis and Assessment
- 11.2. Risk Mitigation Strategies
- 11.3. Business Continuity and Disaster Recovery Planning
- 11.4. Incident Response and Management
- Security Policies and Compliance
- 12.1. Security Policy Basics
- 12.2. Security Policy Frameworks
- 12.3. Regulatory and Legal Aspects of Security
- 12.4. Industry Standards (e.g., ISO/IEC 27001, NIST)
Part VII: Cryptography and Network Security Applications
- Cryptographic Applications
- 13.1. Digital Signatures and Certificates
- 13.2. Public-Key Infrastructure (PKI)
- 13.3. Cryptographic Protocols for Secure Communications
- Advanced Network Security
- 14.1. Wireless Network Security
- 14.2. Securing Mobile Devices
- 14.3. Cloud Security and Security as a Service
- 14.4. Internet of Things (IoT) Security
Appendices
- A. Glossary of Terms
- B. Answers to Selected Exercises
- C. Index
People also search for Computer Security: Principles and Practice 4th:
computer security principles and practice 4th edition
computer security principles and practice 4th edition ppt
computer security principles and practice (4th ed.)
computer security principles and practice (4th edition) pdf github
computer security principles and practice. pearson