Computer Security: Principles and Practice 3rd edition by William Stallings, Lawrie Brown – Ebook PDF Instant Download/Delivery. 0133773922 978-0133773927
Full download Computer Security: Principles and Practice 3rd edition after payment

Product details:
ISBN 10: 0133773922
ISBN 13: 978-0133773927
Author: William Stallings,Lawrie Brown
Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer/Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists.
In recent years, the need for education in computer security and related topics has grown dramatically―and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
It covers all security topics considered Core in the EEE/ACM Computer Science Curriculum. This textbook can be used to prep for CISSP Certification, and includes in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.
The Text and Academic Authors Association named Computer Security: Principles and Practice, First Edition, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.
Teaching and Learning Experience
This program presents a better teaching and learning experience―for you and your students. It will help:
- Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including both research and modeling projects in your course, giving students a broader perspective.
- Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in computer security.
- Enhance Learning with Engaging Features: Extensive use of case studies and examples provides real-world context to the text material.
- Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.
Computer Security: Principles and Practice 3rd Table of contents:
Preface
- Introduction to the Third Edition
- Updates and New Topics
- Acknowledgments
Chapter 1: Introduction to Computer Security
- The Importance of Computer Security
- Defining Security: Confidentiality, Integrity, and Availability
- Types of Attacks and Security Threats
- Basic Security Services
- Security Goals and Security Mechanisms
- Security Policies, Standards, and Procedures
Chapter 2: Cryptographic Tools
- Introduction to Cryptography
- Symmetric Encryption: Block Ciphers and Stream Ciphers
- Asymmetric Encryption: Public-Key Cryptography
- Hash Functions and Digital Signatures
- Cryptographic Protocols and Key Management
- Using Cryptographic Tools for Integrity and Authentication
- Implementing Secure Communications: SSL/TLS
Chapter 3: Security Models and Policies
- Security Models: Bell-LaPadula, Biba, Brewer-Nash
- Access Control Policies: Discretionary, Mandatory, and Role-Based Access Control
- The Role of Trusted Computing Base (TCB)
- Information Flow Control and Security Models
- Security in Multi-Level Systems
Chapter 4: Authentication
- Principles of Authentication
- Passwords and Authentication Factors
- Biometric Authentication: Fingerprints, Retina, and Facial Recognition
- Two-Factor and Multi-Factor Authentication
- Public-Key Infrastructure (PKI) and Digital Certificates
- Authentication Protocols: Kerberos and SSO (Single Sign-On)
Chapter 5: Access Control
- Access Control Concepts and Models
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
- Access Control Lists (ACLs)
- The Role of Auditing and Logging in Access Control
- Common Tools and Techniques for Implementing Access Control
Chapter 6: Security Architecture and Design
- Designing Secure Systems: Layers and Defense-in-Depth
- Security Policy Models and Their Application
- Security in Network and Distributed Systems
- Secure Operating Systems and Secure System Design
- Protection Mechanisms and Trusted Computing
- Security in Cloud Computing and Virtualization
- Security in Mobile and Embedded Systems
Chapter 7: Network Security
- Network Security Fundamentals: Threats and Defenses
- Firewalls and VPNs (Virtual Private Networks)
- Intrusion Detection and Prevention Systems (IDPS)
- Secure Network Protocols: IPsec, SSL/TLS, and HTTPS
- Wireless Network Security: Wi-Fi Protected Access (WPA) and WPA2
- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- Secure Email Protocols: PGP and S/MIME
Chapter 8: Malicious Software (Malware)
- Types of Malware: Viruses, Worms, Trojans, Ransomware
- Malware Delivery Mechanisms
- Malware Detection and Removal Tools
- Exploits and Zero-Day Vulnerabilities
- Prevention and Mitigation of Malware
- Case Studies of Notable Malware Attacks
Chapter 9: Operating System Security
- Operating System Security Concepts
- Securing System Resources: Processes, Memory, Files, and Devices
- Malware Prevention and Detection in OS
- User Authentication and Access Control in OS
- OS Hardening: Reducing Attack Surface
- Virtualization Security and Container Security
- Managing OS Security Patches and Updates
Chapter 10: Database Security
- Database Security Fundamentals
- Securing Database Systems: Access Control, Encryption
- SQL Injection and Its Prevention
- Database Auditing and Monitoring
- Database Backup and Recovery Security
- Secure Database Design and Best Practices
- Case Studies of Database Security Breaches
Chapter 11: Web Security
- Web Application Security: Common Vulnerabilities
- Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF)
- SQL Injection and Command Injection
- Secure Web Development Practices
- Secure Web Browsing: HTTPS, HSTS, and Content Security Policy
- Web Application Firewalls (WAF) and Security Testing Tools
- Protecting User Privacy and Security on the Web
Chapter 12: Mobile and Wireless Security
- Mobile Device Security: Smartphones, Tablets, and IoT Devices
- Mobile Operating System Security: Android and iOS
- Mobile Malware and Threats
- Wireless Network Security: WPA3, Bluetooth, NFC
- Mobile App Security: Development and Secure Coding
- Protecting Privacy and Security on Mobile Devices
- The Internet of Things (IoT) and Security Challenges
Chapter 13: Cloud Security
- The Rise of Cloud Computing
- Cloud Security Issues and Risks
- Cloud Security Models: IaaS, PaaS, SaaS
- Securing Cloud Storage and Virtualization
- Cloud Security Standards and Certifications
- Data Privacy and Compliance in Cloud Environments
- Cloud Incident Response and Forensics
Chapter 14: Legal, Ethical, and Professional Issues in Computer Security
- Legal Frameworks Governing Cybersecurity: GDPR, HIPAA, CCPA
- Intellectual Property and Cybersecurity
- Cybersecurity and Privacy Laws
- Ethical Hacking and Responsible Disclosure
- Security Professional Ethics and Codes of Conduct
- International Cybersecurity Cooperation and Laws
Chapter 15: Security Management
- Security Governance and Risk Management
- Risk Assessment and Risk Management Frameworks
- Developing and Implementing Security Policies and Procedures
- Security Audits and Compliance Assessments
- Business Continuity Planning and Disaster Recovery
- Incident Response and Management
- Security Metrics and Performance Evaluation
Chapter 16: Future Directions in Computer Security
- Emerging Threats and New Attack Vectors
- The Impact of Artificial Intelligence and Machine Learning on Security
- Quantum Computing and Its Implications for Cryptography
- Security in Autonomous Systems and Smart Cities
- The Future of Data Privacy and Security Technology
- Preparing for the Next Generation of Cyber Threats
Appendices
- A. Glossary of Terms
- B. List of Commonly Used Cryptographic Algorithms
- C. Resources for Further Learning
- D. Answers to Selected Exercises
- E. Index
People also search for Computer Security: Principles and Practice 3rd:
computer security principles and practice 4th edition
computer security principles and practice 3rd edition
computer security principles and practice (4th ed.)
computer security principles and practice. pearson
computer security principles and practice william stallings and lawrie brown