Computer System and Network Security

Author:   Gregory B. White (SecureLogix, San Antonio, Texas, USA) ,  Eric A. Fisch (KPMG LLP, Plano, Texas, USA) ,  Udo W. Pooch (Texas A & M University, College Station, Texas, USA) ,  Eric A. Fisch (KPMG LLP, Plano, Texas, USA)
Publisher:   Taylor & Francis Inc
Volume:   7
ISBN:  

9780849371790


Pages:   310
Publication Date:   10 August 1995
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $315.00 Quantity:  
Add to Cart

Share |

Computer System and Network Security


Add your own review!

Overview

Full Product Details

Author:   Gregory B. White (SecureLogix, San Antonio, Texas, USA) ,  Eric A. Fisch (KPMG LLP, Plano, Texas, USA) ,  Udo W. Pooch (Texas A & M University, College Station, Texas, USA) ,  Eric A. Fisch (KPMG LLP, Plano, Texas, USA)
Publisher:   Taylor & Francis Inc
Imprint:   CRC Press Inc
Volume:   7
Dimensions:   Width: 17.10cm , Height: 2.20cm , Length: 24.10cm
Weight:   0.730kg
ISBN:  

9780849371790


ISBN 10:   0849371791
Pages:   310
Publication Date:   10 August 1995
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Computer Security Fundamentals Objectives of Computer Security Issues Involved in Computer Security Privacy and Ethics Risk Analysis Theory Possible Loss (L) Probability of Loss Occurrence (P) Burden of Preventing Loss (B) Applying the Risk Analysis Equation Risk Analysis in Computer Security Terminology Application Developing Secure Computer Systems External Security Measures Structure of a Computer System Secure Computer System Issues Security Models Specification and Verification Security Models Bell and LaPadula Clark-Wilson Goguen-Meseguer TCSEC Discretionary Access Requirements Mandatory Access Requirements User Authentication Authentication Objectives Authentication Methods Informational Keys Physical Keys Biometric Keys Access and Information Flow Controls File Passwords Capabilities Based Access Control Lists Protection Bits Controls for Mandatory Access Trojan Horses AUDITING and INTRUSION DETECTION Audit Trail Features Intrusion Detection Systems User Profiling Intruder Profiling Signature Analysis Action Based IDES MIDAS Haystack Network Intrusion Detection Network Attack Characteristics NSM DIDS NADIR CSM Monitoring and the Law Damage Control and Assessment Damage Control Inform the Authorities Backup System Data Remove the Intruder Contain and Monitor the Intruder Lock Stolen Accounts Require Additional Authentication Damage Assessment Attack Recovery Damage Prevention Network Security Network Fundamentals Network Security Issues Basic Network Security Objectives and Threats Security Services The Trusted Network Interpretation TNI Security Service AIS Interconnection Issues Distributed Systems Security Firewalls Simple Damage Limiting Approaches Network Firewalls Packet Filtering Gateways Circuit Level Gateways Application Level Gateways Firewall Costs and Effectiveness Database Security Database Management System Primer DBMS Vulnerabilities and Responses Inference Aggregation Data Integrity Trojan Horses Cryptography Substitution Ciphers Caesar Cipher ROT13 Substitution Cipher Variations Vigenere Ciphers One Time Pads Transposition Ciphers Encrypting Digital Communication DES IDEA Key Escrow Public Key Cryptography Digital Signatures Malicious Software Viruses Worms Trojan Horses Time Bombs Security Standards The Federal Criteria The Common Criteria The Trusted Computer System Evaluation Criteria The Information Technology Security Evaluation Criteria Case Study The Hannover Hackers An Evening With Berferd The Internet Worm Appendix: Information Warfare

Reviews

Author Information

Gregory B. White (SecureLogix, San Antonio, Texas, USA) (Author) ,  Eric A. Fisch (KPMG LLP, Plano, Texas, USA) (Author) ,  Udo W. Pooch (Texas A & M University, College Station, Texas, USA) (Author)

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List