|
![]() |
|||
|
||||
OverviewComputer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material. Hacking and lab exercises, real-world case studies, and security assessments further your understanding of text concepts. Full Product DetailsAuthor: William Stallings , Lawrie BrownPublisher: Pearson Education Limited Imprint: Pearson Education Limited Edition: 5th edition Dimensions: Width: 19.00cm , Height: 3.60cm , Length: 23.30cm Weight: 1.500kg ISBN: 9781292473291ISBN 10: 1292473290 Pages: 1000 Publication Date: 06 September 2024 Audience: College/higher education , Tertiary & Higher Education Format: Paperback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsOverview Cryptographic Tools User Authentication Access Control Database and Data Center Security Malicious Software Denial-of-Service Attacs Intrusion Detection Firewalls and Intrusion Prevention Systems Buffer Overflow Software Security Operating Systems Security Cloud and IoT Security IT Security Management and Risk Assessment IT Security Controls, plans, and Procedures Physical and Infrastructure Security Human Resources Security Security Auiditing Legal and Ethical Aspects Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Internet Security Protocols and Standards Internet Authentication Applications Wireless Network Security APPENDICES Projects and Other Student Exercises for Teaching Computer Security Some Aspects of Number Theory Standards and Standard-Setting Organizations Random and Pseudorandom Number Generation Message Authentication Codes Based on Block Ciphers The TCP/IP Protocol Architecture Radix-64 Conversion The Domain Name System The Base Rate Fallacy SHA-3 814 GlossaryReviewsAuthor InformationDr. William Stallings has authored 19 titles and, counting revised editions, more than 40 books on computer security, computer networking and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection and use of networking software and products. He created and maintains the Computer Science Student Resource Site. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering. Tab Content 6Author Website:Countries AvailableAll regions |