Computer Security: Principles and Practice (Hardcover)
暫譯: 計算機安全:原則與實踐(精裝版)
William Stallings, Lawrence Brown
- 出版商: Prentice Hall
- 出版日期: 2007-08-12
- 售價: $530
- 語言: 英文
- 頁數: 512
- 裝訂: Hardcover
- ISBN: 0136004245
- ISBN-13: 9780136004240
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$1,058Software Engineering: A Practitioner's Approach, 6/e
-
$990$782 -
$450$356 -
$980$774 -
$580$452 -
$1,540$1,463 -
$720$569 -
$480$408 -
$880$695 -
$480$408 -
$290$226 -
$380$342 -
$600$480 -
$990Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation (Paperback)
-
$580$458 -
$490$417 -
$420$328 -
$590$460 -
$820$648 -
$850$723 -
$680$578 -
$450$351 -
$490$382 -
$860$731 -
$580$458
商品描述
Description
For courses in Computer/Network Security.
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
Table of Contents
Notation Preface Chapter 0 Reader's and Instructor's Guide
0.1 Outline of the Book
0.2 A Roadmap for Readers and Instructors
0.3 Internet and Web Resources
0.4 Standards
Chapter 1 Overview
1.1 Computer Security Concepts
1.2 Threats, Attacks, and Assets
1.3 Security Functional Requirements
1.4 A Security Architecture for Open Systems
1.5 The Scope of Computer Security
1.6 Computer Security Trends
1.7 Computer Security Strategy
1.8 Recommended Reading and Web Sites
1.9 Key Terms, Review Questions, and Problems
Appendix 1A Signficant Security Standards and Documents
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
2.1 Confidentiality with Symmetric Encryption
2.2 Message Authentication and Hash Functions
2.3 Public-Key Encryption
2.4 Digital Signatures and Key Management
2.5 Random and Pseudorandom Numbers
2.6 Practical Application: Encryption of Stored Data
2.7 Recommended Reading and Web Sites
2.8 Key Terms, Review Questions, and Problems
Chapter 3 User Authentication
3.1 Means of Authentication
3.2 Password-Based Authentication
3.3 Token-Based Authentication
3.4 Biometric Authentication
3.5 Remote User Authentication
3.6 Security Issues for User Authentication
3.7 Practical Application: An Iris Biometric System
3.8 Case Study: Security Problems for ATM Systems
3.9 Recommended Reading and Web Sites
3.10 Key Terms, Review Questions, and Problems
Chapter 4 Access Control
4.1 Access Control Principles
4.2 Subjects, Objects, and Access Rights
4.3 Discretionary Access Control
4.4 Example: UNIX File Access Control
4.5 Role-Based Access Control
4.6 Case Study: RBAC System for a Bank
4.7 Recommended Reading and Web Sites
4.8 Key Terms, Review Questions, and Problems
Chapter 5 Database Security
5.1 Relational Databases
5.2 Database Access Control
5.3 Inference
5.4 Statistical Databases
5.5 Database Encryption
5.6 Recommended Reading
5.7 Key Terms, Review Questions, and Problems
Chapter 6 Intrusion Detection
6.1 Intruders
6.2 Intrusion Detection
6.3 Host-Based Intrusion Detection
6.4 Distributed Host-Based Intrusion Detection
6.5 Network-Based Intrusion Detection
6.6 Distributed Adaptive Intrusion Detection
6.7 Intrustion Detection Exchange Format
6.8 Honeypots
6.9 Example System: Snort
6.10 Recommended Reading and Web Sites
6.11 Key Terms, Review Questions, and Problems
Appendix 6A:The Base-Rate Fallacy
Chapter 7 Malicious Software
7.1 Types of Malicious Software
7.2 Viruses
7.3 Virus Countermeasures
7.4 Worms
7.5 Bots
7.6 Rootkits
7.7 Recommended Reading and Web Sites
7.8 Key Terms, Review Questions, and Problems
Chapter 8 Denial of Service
8.1 Denial of Service Attacks
8.2 Flooding Attacks
8.3 Distributed Denial of Service Attacks
8.4 Reflector and Amplifier Attacks
8.5 Defenses Against Denial of Service Attacks
8.6 Responding to a Denial of Service Attack
8.7 Recommended Reading and Web Sites
8.8 Key Terms, Review Questions, and Problems
Chapter 9 Firewalls and Intrusion Prevention Systems
9.1 The Need for Firewalls
9.2 Firewall Characteristics
9.3 Types of Firewalls
9.4 Firewall Basing
9.5 Firewall Location and Configurations
9.6 Intrusion Prevention Systems
9.7 Example: Unified Threat Management Products
9.8 Recommended Reading and Web Sites
9.9 Key Terms, Review Questions, and Problems
Chapter 10 Trusted Computing and Multilevel Security
10.1 The Bell-LaPadula Model for Computer Security
10.2 Other Formal Models for Computer Security
10.3 The Concept of Trusted Systems
10.4 Application of Multilevel Security
10.5 Trusted Computing and the Trusted Platform Module
10.6 Common Criteria for Information Technology Security Evaluation
10.7 Assurance and Evaluation
10.8 Recommended Reading and Web Sites
10.9 Key Terms, Review Questions, and Problems
PART TWO SOFTWARE SECURITY
Chapter 11 Buffer Overflow
11.1 Stack Overflows
11.2 Defending Against Buffer Overflows
11.3 Other Forms of Overflow Attacks
11.4 Recommended Reading and Web Sites
11.5 Key Terms, Review Questions, and Problems
Chapter 12 Other Software Security Issues
12.1 Software Security Issues
12.2 Handling Program Input
12.3 Writing Safe Program Code
12.4 Interacting with the Operating System
12.5 Handling Program Input
12.6 Recommended Reading and Web Sites
12.7 Key Terms, Review Questions, and Problems
PART THREE MANAGEMENT ISSUES
Chapter 13 Physical and Infrastructure Security
13.1 Overview
13.2 Physical Security Threats
13.3 Physical Security Prevention and Mitigation Measures
13.4 Recovery from Physical Security Breaches
13.5 Threat Assessment, Planning, and Plan Implementation
13.6 Example: A Corporate Physical Security Policy.
13.7 Integration of Physical and Logical Security
13.8 Recommended Reading and Web Sites
13.9 Key Terms, Review Questions, and Problems
Chapter 14 Human Factors
14.1 Security Awareness, Training, and Education
14.2 Organizational Security Policy
14.3 Employment Practices and Policies
14.4 E-Mail and Internet Use Policies
14.5 Example: A Corporate Security Policy Document
14.6 Recommended Reading and Web Sites
14.7 Key Terms, Review Questions, and Problems
Appendix 14A: Security Awareness Standard of Good Practice
Appendix 14B: Security Policy Standard of Good Practice
Chapter 15 Security Auditing
15.1 Security Auditing Architecture
15.2 The Security Audit Trail
15.3 Implementing the Logging Function
15.4 Audit Trail Analysis
15.5 Example: An Integrated Approach
15.6 Recommended Reading and Web Sites
15.7 Key Terms, Review Questions, and Problems
Chapter 16 IT Security Management and Risk Assessment
16.1 IT Security Management
16.2 Organizational Context and Security Policy
16.3 Security Risk Assessment
16.4 Detailed Security Risk Analysis
16.5 Case Study: Silver Star Mines
16.6 Recommended Reading and Web Sites
16.7 Key Terms, Review Questions, and Problems
Chapter 17 IT Security Controls, Plans and Procedures
17.1 IT Security Management Implementation
17.2 Security Controls or Safeguards
17.3 IT Security Plan
17.4 Implementation of Controls
17.5 Implementation Followup
17.6 Case Study: Silver Star Mines
17.7 Recommended Reading and Web Sites
17.8 Key Terms, Review Questions, and Problems
Chapter 18 Legal and Ethical Aspects
18.1 Cybercrime and Computer Crime
18.2 Intellectual Property
18.3 Privacy
18.4 Ethical Issues
18.5 Recommended Reading and Web Sites
18.6 Key Terms, Review Questions, and Problems
Appendix 18A: Information Privacy Standard of Good Practice
PART FOUR CRYPTOGRAPHIC ALGORITHMS
Chapter 19 Symmetric Encryption and Message Confidentiality
19.1 Symmetric Encryption and Message Confidentiality
19.2 Data Encryption Standard
19.3 Advanced Encryption Standard
19.4 Stream Ciphers and RC4
19.5 Cipher Block Modes of Operation
19.6 Location of Symmetric Encryption Devices
19.7 Key Distribution
19.8 Recommended Reading and Web Sites
19.9 Key Terms, Review Questions, and Problems
Chapter 20 Public-Key Cryptography and Message Authentication
20.1 Secure Hash Functions
20.2 HMAC
20.3 The RSA Public-Key Encryption Algorithm
20.4 Diffie-Hellman and Other Asymmetric Algorithms
20.5 Recommended Reading and Web Sites
20.6 Key Terms, Review Questions, and Problems
PART FIVE INTERNET SECURITY Chapter 21 Internet Security Protocols and Standards
21.1 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
21.2 IPv4 and IPv6 Security
21.3 Secure Email and S/MIME
21.4 Recommended Reading and Web Sites
21.5 Key Terms, Review Questions, and Problems
Appendix 21A Radix-64 Conversion
Chapter 22 Internet Authentication Applications
22.1 Kerberos
22.2 X.509
22.3 Public-Key Infrastructure
22.4 Federated Identity Management
22.5 Recommended Reading and Web Sites
22.6 Key Terms, Review Questions, and Problems
PART SIX OPERATING SYSTEM SECURITY*
Chapter 23 Linux Security
23.1 Introduction
23.2 Linux's Security Model
23.3 The Linux DAC in Depth: Filesystem Security
23.4 Linux Vulnerabilities
23.5 Linux System Hardening
23.6 Application Security
23.7 Mandatory Access Controls
23.8 Recommended Reading and Web Sites
23.9 Key Terms, Review Questions, and Problems
Chapter 24 Windows Security
–Windows Overview
–Windows Security Basics
–Windows User Security
–Windows Network Security
APPENDICES
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
A.3 Fermat's and Euler's Theorems
Appendix B Random and Pseudorandom Number Generation
B.1 The Use of Random Numbers
B.2 Pseudorandom Number Generators (PRNGs)
B.3 True Random Number Generators
Appendix C Projects for Teaching Computer Security
C.1 Research Projects
C.2 Programming Projects
C.3 Laboratory Exercises
C.4 Writing Assignments
C.5 Reading/Report Assignments
REFERENCES INDEX LIST OF ACRONYMS
ONLINE APPENDICES
Appendix D Standards and Standard-Setting Organizations
A.1 The Importance of Standards
A.2 Internet Standards and the Internet Society
A.3 National Institute of Standards and Technology
A.4 ITU-T
A.5 ISO
Appendix E TCP/IP Protocol Architecture
Appendix F Glossary
商品描述(中文翻譯)
**描述**
適用於計算機/網絡安全課程。
近年來,計算機安全及相關主題的教育需求急劇增長,對於任何學習計算機科學或計算機工程的人來說都是必不可少的。這是唯一一本提供綜合、全面、最新的該主題廣泛範疇的教材。除了廣泛的教學計劃外,本書還為研究和建模項目提供無與倫比的支持,讓學生擁有更廣泛的視野。
**目錄**
**符號** **前言** **第0章 讀者和講師指南**
0.1 書籍大綱
0.2 讀者和講師的路線圖
0.3 網際網路和網頁資源
0.4 標準
**第1章 概述**
1.1 計算機安全概念
1.2 威脅、攻擊和資產
1.3 安全功能需求
1.4 開放系統的安全架構
1.5 計算機安全的範疇
1.6 計算機安全趨勢
1.7 計算機安全策略
1.8 推薦閱讀和網站
1.9 關鍵術語、回顧問題和練習
附錄1A 重要的安全標準和文件
**第一部分 計算機安全技術與原則**
**第2章 密碼工具**
2.1 使用對稱加密的保密性
2.2 訊息認證和雜湊函數
2.3 公鑰加密
2.4 數位簽章和金鑰管理
2.5 隨機數和偽隨機數
2.6 實用應用:存儲數據的加密
2.7 推薦閱讀和網站
2.8 關鍵術語、回顧問題和練習
**第3章 使用者認證**
3.1 認證手段
3.2 基於密碼的認證
3.3 基於令牌的認證
3.4 生物識別認證
3.5 遠端使用者認證
3.6 使用者認證的安全問題
3.7 實用應用:虹膜生物識別系統
3.8 案例研究:自動提款機系統的安全問題
3.9 推薦閱讀和網站
3.10 關鍵術語、回顧問題和練習
**第4章 存取控制**
4.1 存取控制原則
4.2 主體、對象和存取權限
4.3 自主存取控制
4.4 例子:UNIX檔案存取控制
4.5 基於角色的存取控制
4.6 案例研究:銀行的RBAC系統
4.7 推薦閱讀和網站
4.8 關鍵術語、回顧問題和練習
**第5章 數據庫安全**
5.1 關聯數據庫
5.2 數據庫存取控制
5.3 推斷
5.4 統計數據庫
5.5 數據庫加密
5.6 推薦閱讀
5.7 關鍵術語、回顧問題和練習
**第6章 入侵檢測**
6.1 入侵者
6.2 入侵檢測
6.3 基於主機的入侵檢測
6.4 分散式基於主機的入侵檢測
6.5 基於網絡的入侵檢測
6.6 分散式自適應入侵檢測
6.7 入侵檢測交換格式
6.8 蜜罐
6.9 例子系統:Snort
6.10 推薦閱讀和網站
6.11 關鍵術語、回顧問題和練習
附錄6A:基率謬誤
**第7章 惡意軟體**
7.1 惡意軟體的類型
7.2 病毒
7.3 病毒對策
7.4 蠕蟲
7.5 機器人
7.6 Rootkit
7.7 推薦閱讀和網站
7.8 關鍵術語、回顧問題和練習
**第8章 拒絕服務**
8.1 拒絕服務攻擊
8.2 洪水攻擊
8.3 分散式拒絕服務攻擊
8.4 反射和放大攻擊
8.5 對抗拒絕服務攻擊的防禦
8.6 對拒絕服務攻擊的回應
8.7 推薦閱讀和網站
8.8 關鍵術語、回顧問題和練習
**第9章 防火牆和入侵預防系統**
9.1 防火牆的必要性
9.2 防火牆特性
9.3 防火牆的類型
9.4 防火牆基礎
9.5 防火牆的位置和配置
9.6 入侵預防系統
9.7 例子:統一威脅管理產品
9.8 推薦閱讀和網站
9.9 關鍵術語、回顧問題和練習
**第10章 可信計算與多層安全**
10.1 Bell-LaPadula模型的計算機安全
10.2 其他計算機安全的正式模型