Computer Security: Principles and Practice 2nd edition by William Stallings, Lawrie Brown – Ebook PDF Instant Download/Delivery. 0132775069 978-0132775069
Full download Computer Security: Principles and Practice 2nd edition after payment

Product details:
ISBN 10: 0132775069
ISBN 13: 978-0132775069
Author: William Stallings, Lawrie Brown
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.
Computer Security: Principles and Practice 2nd Table of contents:
Part 1: Introduction
Chapter 1: Introduction to Computer Security
1.1. What Is Computer Security?
1.2. Security Goals
1.3. Security Threats
1.4. Security Mechanisms
1.5. Security Services
1.6. Types of Attacks
1.7. The Security Policy
1.8. The Security Architecture
1.9. The Role of Cryptography
1.10. Summary
Chapter 2: The Need for Security
2.1. Security Problems in Computing
2.2. Threats and Vulnerabilities
2.3. Risk Management
2.4. Types of Risk
2.5. Security Breaches
2.6. Cost of a Security Breach
2.7. Security Controls
2.8. Security Models
2.9. Security Objectives
2.10. Conclusion
Part 2: Cryptography and Network Security
Chapter 3: Symmetric Encryption and Message Confidentiality
3.1. Symmetric Encryption Overview
3.2. Classical Symmetric Ciphers
3.3. Data Encryption Standard (DES)
3.4. Advanced Encryption Standard (AES)
3.5. Block Cipher Modes of Operation
3.6. Evaluation Criteria for AES
3.7. Triple DES
3.8. Stream Ciphers
3.9. Cryptanalysis
3.10. Public Key Cryptography and Hash Functions
Chapter 4: Public Key Cryptography and RSA
4.1. Public Key Cryptography Overview
4.2. RSA Algorithm
4.3. RSA Key Generation
4.4. RSA Encryption and Decryption
4.5. RSA Security
4.6. Digital Signatures
4.7. Public Key Infrastructure (PKI)
4.8. Key Management
4.9. Certificate Authorities
4.10. Conclusion
Chapter 5: Authentication and Hash Functions
5.1. Authentication Overview
5.2. Message Authentication Codes (MACs)
5.3. Hash Functions
5.4. Secure Hash Algorithms (SHA)
5.5. HMAC
5.6. Digital Signatures and Authentication
5.7. Public Key Authentication
5.8. Digital Certificates
5.9. Key Distribution
5.10. Authentication Protocols
Chapter 6: Network Security
6.1. Network Security Overview
6.2. Threats to Network Security
6.3. Firewalls
6.4. Intrusion Detection Systems (IDS)
6.5. Intrusion Prevention Systems (IPS)
6.6. Virtual Private Networks (VPNs)
6.7. Internet Protocol Security (IPsec)
6.8. Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
6.9. Wireless Network Security
6.10. DNS Security
Part 3: System Security
Chapter 7: Access Control and Passwords
7.1. Access Control Models
7.2. Discretionary Access Control (DAC)
7.3. Mandatory Access Control (MAC)
7.4. Role-Based Access Control (RBAC)
7.5. Access Control List (ACL)
7.6. Authentication and Authorization
7.7. Password Management
7.8. Multi-Factor Authentication
7.9. Biometrics
7.10. Access Control in Operating Systems
Chapter 8: Operating System Security
8.1. Operating System Security Overview
8.2. Protecting System Resources
8.3. Operating System Security Models
8.4. Security of File Systems
8.5. System Call Interception
8.6. Process and Memory Management
8.7. Malware: Viruses, Worms, and Trojans
8.8. OS Hardening
8.9. Audit and Logging Mechanisms
8.10. Security in Mobile Operating Systems
Part 4: Security Policies and Risk Management
Chapter 9: Security Policies and Risk Management
9.1. Security Policy Development
9.2. Risk Management Framework
9.3. Threats, Vulnerabilities, and Risks
9.4. Security Policy Types
9.5. Risk Assessment Methodologies
9.6. Business Continuity Planning
9.7. Disaster Recovery Planning
9.8. Compliance and Legal Issues
9.9. Auditing and Reporting
9.10. Case Studies
Part 5: Advanced Topics
Chapter 10: Cryptographic Protocols
10.1. Cryptographic Protocols Overview
10.2. Key Exchange Protocols
10.3. Secure E-mail Protocols
10.4. SSL/TLS Protocols
10.5. SSH and IPSec
10.6. Wireless Security Protocols
10.7. Web Security Protocols
10.8. Blockchain and Cryptocurrency Security
10.9. Post-Quantum Cryptography
10.10. Security in Cloud Computing
Chapter 11: Web Security
11.1. Web Security Overview
11.2. Web Application Vulnerabilities
11.3. Cross-Site Scripting (XSS)
11.4. Cross-Site Request Forgery (CSRF)
11.5. SQL Injection
11.6. Secure Coding Practices
11.7. Web Application Firewalls (WAFs)
11.8. Securing Web Services
11.9. HTTPS and SSL/TLS for Web Security
11.10. Protecting User Privacy
Chapter 12: Wireless Security
12.1. Wireless Security Overview
12.2. Threats to Wireless Networks
12.3. Wired Equivalent Privacy (WEP)
12.4. Wi-Fi Protected Access (WPA)
12.5. WPA2 and WPA3
12.6. Bluetooth Security
12.7. Securing Wireless LANs
12.8. Mobile Device Security
12.9. Cellular Network Security
12.10. Future of Wireless Security
Appendices
- A. Security Tools
- B. Standards and Laws
- C. Glossary
- D. Index
People also search for Computer Security: Principles and Practice 2nd:
computer security principles and practice 4th edition ppt
computer security principles and practice 4th edition solutions
computer security principles and practice solution manual
computer security principles and practice third edition
computer security principles and practice