Security in Computing, 4/e (Hardcover)
暫譯: 計算機安全,第四版 (精裝本)
Charles P. Pfleeger, Shari Lawrence Pfleeger
- 出版商: Prentice Hall
- 出版日期: 2006-10-23
- 售價: $4,370
- 貴賓價: 9.5 折 $4,152
- 語言: 英文
- 頁數: 880
- 裝訂: Hardcover
- ISBN: 0132390779
- ISBN-13: 9780132390774
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$290$226 -
$650$553 -
$880$695 -
$680$578 -
$880$695 -
$390$332 -
$780$663 -
$650$507 -
$520$406 -
$980$774 -
$720$569 -
$720$569 -
$1,200$948 -
$580$493 -
$620$490 -
$650$514 -
$490$417 -
$620$484 -
$650$199 -
$600$480 -
$580$458 -
$780$515 -
$650$514 -
$750$593 -
$650$514
相關主題
商品描述
Description
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security
For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends.
The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses.
Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.
New coverage also includes
- Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks
- Web application threats and vulnerabilities
- Networks of compromised systems: bots, botnets, and drones
- Rootkits--including the notorious Sony XCP
- Wi-Fi network security challenges, standards, and techniques
- New malicious code attacks, including false interfaces and keystroke loggers
- Improving code quality: software engineering, testing, and liability approaches
- Biometric authentication: capabilities and limitations
- Using the Advanced Encryption System (AES) more effectively
- Balancing dissemination with piracy control in music and other digital content
- Countering new cryptanalytic attacks against RSA, DES, and SHA
- Responding to the emergence of organized attacker groups pursuing profit
Table of Contents
Foreword xix
Preface xxv Chapter 1: Is There a Security Problem in Computing? 11.1 What Does "Secure" Mean? 1
1.2 Attacks 5
1.3 The Meaning of Computer Security 9
1.4 Computer Criminals 21
1.5 Methods of Defense 23
1.6 What's Next 30
1.7 Summary 32
1.8 Terms and Concepts 32
1.9 Where the Field Is Headed 33
1.10 To Learn More 34
1.11 Exercises 34Chapter 2: Elementary Cryptography 37
2.1 Terminology and Background 38
2.2 Substitution Ciphers 44
2.3 Transpositions (Permutations) 55
2.4 Making "Good" Encryption Algorithms 59
2.5 The Data Encryption Standard 68
2.6 The AES Encryption Algorithm 72
2.7 Public Key Encryption 75
2.8 The Uses of Encryption 79
2.9 Summary of Encryption 91
2.10 Terms and Concepts 92
2.11 Where the Field Is Headed 93
2.12 To Learn More 94
2.13 Exercises 94Chapter 3 Program Security 98
3.1 Secure Programs 99
3.2 Nonmalicious Program Errors 103
3.3 Viruses and Other Malicious Code 111
3.4 Targeted Malicious Code 141
3.5 Controls Against Program Threats 160
3.6 Summary of Program Threats and Controls 181
3.7 Terms and Concepts 182
3.8 Where the Field Is Headed 183
3.9 To Learn More 185
3.10 Exercises 185Chapter 4 Protection in General-Purpose Operating Systems 188
4.1 Protected Objects and Methods of Protection 189
4.2 Memory and Address Protection 193
4.3 Control of Access to General Objects 204
4.4 File Protection Mechanisms 215
4.5 User Authentication 219
4.6 Summary of Security for Users 236
4.7 Terms and Concepts 237
4.8 Where the Field Is Headed 238
4.9 To Learn More 239
4.10 Exercises 239Chapter 5 Designing Trusted Operating Systems 242
5.1 What Is a Trusted System? 243
5.2 Security Policies 245
5.3 Models of Security 252
5.4 Trusted Operating System Design 264
5.5 Assurance in Trusted Operating Systems 287
5.6 Summary of Security in Operating Systems 312
5.7 Terms and Concepts 313
5.8 Where the Field Is Headed 315
5.9 To Learn More 315
5.10 Exercises 316Chapter 6 Database and Data Mining Security 318
6.1 Introduction to Databases 319
6.2 Security Requirements 324
6.3 Reliability and Integrity 329
6.4 Sensitive Data 335
6.5 Inference 341
6.6 Multilevel Databases 351
6.7 Proposals for Multilevel Security 356
6.8 Data Mining 367
6.9 Summary of Database Security 371
6.10 Terms and Concepts 371
6.11 Where the Field Is Headed 372
6.12 To Learn More 373
6.13 Exercises 373Chapter 7 Security in Networks 376
7.1 Network Concepts 377
7.2 Threats in Networks 396
7.3 Network Security Controls 440
7.4 Firewalls 474
7.5 Intrusion Detection Systems 484
7.6 Secure E-mail 490
7.7 Summary of Network Security 496
7.8 Terms and Concepts 498
7.9 Where the Field Is Headed 500
7.10 To Learn More 502
7.11 Exercises 502Chapter 8 Administering Security 508
8.1 Security Planning 509
8.2 Risk Analysis 524
8.3 Organizational Security Policies 547
8.4 Physical Security 556
8.5 Summary 566
8.6 Terms and Concepts 567
8.7 To Learn More 568
8.8 Exercises 569Chapter 9 The Economics of Cybersecurity 571
9.1 Making a Business Case 572
9.2 Quantifying Security 578
9.3 Modeling Cybersecurity 589
9.5 Summary 599
9.6 Terms and Concepts 600
9.7 To Learn More 601
9.8 Exercises 601Chapter 10 Privacy in Computing 603
10.1 Privacy Concepts 604
10.2 Privacy Principles and Policies 608
10.3 Authentication and Privacy 619
10.4 Data Mining 623
10.5 Privacy on the Web 626
10.6 E-mail Security 635
10.7 Impacts on Emerging Technologies 638
10.8 Summary 643
10.9 Terms and Concepts 643
10.10 Where the Field Is Headed 645
10.11 To Learn More 645
10.12 Exercises 646Chapter 11 Legal and Ethical Issues in Computer Security 647
11.1 Protecting Programs and Data 649
11.2 Information and the Law 663
11.3 Rights of Employees and Employers 670
11.4 Redress for Software Failures 673
11.5 Computer Crime 679
11.6 Ethical Issues in Computer Security 692
11.7 Case Studies of Ethics 698
11.8 Terms and Concepts 714
11.9 To Learn More 714
11.10 Exercises 715Chapter 12 Cryptography Explained 717
12.1 Mathematics for Cryptography 718
12.2 Symmetric Encryption 730
12.3 Public Key Encryption Systems 757
12.4 Quantum Cryptography 774
12.5 Summary of Encryption 778
12.6 Terms and Concepts 778
12.7 Where the Field Is Headed 779
12.8 To Learn More 779
12.9 Exercises 779Bibliography 782
Index 815
商品描述(中文翻譯)
**描述**
**資訊安全的新最前沿:現在涵蓋網路安全的經濟學以及隱私與資訊安全的交集**
多年來,IT和安全專業人士及學生一直將《計算中的安全》視為有關計算機安全攻擊和對策的權威指南。在他們的新第四版中,Charles P. Pfleeger和Shari Lawrence Pfleeger徹底更新了這本經典指南,以反映當今最新的技術、標準和趨勢。
作者首先介紹計算機安全的核心概念和詞彙,包括攻擊和控制。接下來,作者系統地識別和評估當前面臨的威脅,包括程序、操作系統、數據庫系統和網絡。對於每一種威脅,他們提供最佳實踐的應對措施。
《計算中的安全,第四版》超越了技術,涵蓋了在保護基礎設施和資訊時面臨的關鍵管理問題。本版包含一章全新的網路安全經濟學,解釋如何為安全投資建立商業案例。另一章新內容則涉及隱私——從數據挖掘和身份盜竊,到RFID和電子投票。
新內容還包括:
- 影響安全的程式錯誤:中間人攻擊、時序攻擊和特權提升攻擊
- 網頁應用程式的威脅和漏洞
- 被攻陷系統的網絡:機器人、機器人網絡和無人機
- Rootkit——包括臭名昭著的Sony XCP
- Wi-Fi網絡安全挑戰、標準和技術
- 新的惡意代碼攻擊,包括虛假介面和鍵盤記錄器
- 改善代碼質量:軟體工程、測試和責任方法
- 生物識別認證:能力和限制
- 更有效地使用高級加密標準(AES)
- 在音樂和其他數位內容中平衡散佈與盜版控制
- 反制針對RSA、DES和SHA的新密碼分析攻擊
- 應對追求利潤的組織攻擊者集團的出現
**目錄**
**前言 xix
序言 xxv
第一章:計算中是否存在安全問題? 1**
1.1 什麼是「安全」? 1
1.2 攻擊 5
1.3 計算機安全的意義 9
1.4 計算機罪犯 21
1.5 防禦方法 23
1.6 接下來是什麼 30
1.7 總結 32
1.8 術語和概念 32
1.9 該領域的發展方向 33
1.10 進一步了解 34
1.11 練習 34
**第二章:基本密碼學 37**
2.1 術語和背景 38
2.2 置換密碼 44
2.3 置換(排列) 55
2.4 創建「良好」的加密算法 59
2.5 數據加密標準 68
2.6 AES加密算法 72
2.7 公鑰加密 75
2.8 加密的用途 79
2.9 加密總結 91
2.10 術語和概念 92
2.11 該領域的發展方向 93
2.12 進一步了解 94
2.13 練習 94
**第三章:程式安全 98**
3.1 安全程式 99
3.2 非惡意程式錯誤 103
3.3 病毒和其他惡意代碼 111
3.4 針對性惡意代碼 141
3.5 對抗程式威脅的控制 160
3.6 程式威脅和控制的總結 181
3.7 術語和概念 182
3.8 該領域的發展方向 183
3.9 進一步了解 185
3.10 練習 185
**第四章:通用操作系統的保護 188**
4.1 受保護的對象和保護方法 189
4.2 記憶體和地址保護 193
4.3 對通用對象的訪問控制 204
4.4 文件保護機制 215
4.5 用戶認證 219
4.6 用戶安全的總結 236
4.7 術語和概念 237
4.8 該領域的發展方向 238
4.9 進一步了解 239
4.10 練習 239
**第五章:設計可信的操作系統 242**
5.1 什麼是可信系統? 243
5.2 安全政策 245
5.3 安全模型 252
5.4 可信操作系統設計 264
5.5 可信操作系統的保證 287
5.6 操作系統安全的總結 312
5.7 術語和概念 313
5.8 該領域的發展方向 315
5.9 進一步了解 315
5.10 練習 316
**第六章:數據庫和數據挖掘安全 318**
6.1 數據庫介紹 319
6.2 安全需求 324
6.3 可靠性和完整性 329
6.4 敏感數據 335
6.5 推斷 341
6.6 多層次數據庫 351
6.7 多層次安全的提案 356
6.8 數據挖掘 367
6.9 數據庫安全的總結 371
6.10 術語和概念 371
6.11 該領域的發展方向 372
6.12 進一步了解 373
6.13 練習 373
**第七章:網絡安全 376**
7.1 網絡概念 377
7.2 網絡中的威脅 396
7.3 網絡安全控制