Charles P. Pfleeger is an independent information security consultant and principal of the Pfleeger Consulting Group. She was named one of the world's top software engineering researchers by the "Journal of Systems and Software,. Security in Computing. Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing.
|Published (Last):||17 October 2017|
|PDF File Size:||17.29 Mb|
|ePub File Size:||14.97 Mb|
|Price:||Free* [*Free Regsitration Required]|
View larger. Preview this title online. Request a copy. Download instructor resources. Additional order info. Buy this product. Buy an eText. This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more.
Cryptography is critical to computer security; it is an essential tool that students and professionals must know, appreciate and understand.
But as with most tools, the user does not need to be a maker: using a screwdriver successfully is entirely separate from knowing how to forge the metal from which it is made. This edition will separate the use of cryptography from its underlying mathematical principles. It will introduce cryptography early in the book to provide a solid background on types of algorithms, appropriate uses of these different types, and advanced concepts such as digital signatures and cryptographic hash codes.
It will also address how cryptography can fail. However, it will cover these topics without revealing the internals of cryptography; closer to the end of the book it will delve into the internals of specific algorithms.
In this way, readers who want to know the details can study those and can even read the later chapter early, out of the normal sequence , but it will not unnecessarily burden readers who, like most users, will never get closer to cryptography than an encrypt function.
One strength of SiC4 has been its sidebars. Readers enjoy the brief examples of real life exploits. Fortunately, the news is full of stories of security failures, and it is important to connect these actual events to the strong pedagogy of the book. ACS, which was organized around attacks of different types, include many timely incident stories that we can pull into SiC5. Cloud computing and mobile code and computing are not covered extensively in SiC4. Cloud computing appears as a six page interlude in ACS, but in the few years since ACS was written, the use of cloud computing has expanded, as well as the security ramifications.
We intend to devote an entire chapter to cloud computing. Similarly, mobile code and mobile computing have grown. These topics appeared briefly in SiC4 and ACS, but we plan to expand mobile computing into its own chapter, as well. The topic progression of SiC4 largely followed its predecessor editions, back to the first edition In networking was certainly neither as important nor pervasive as it has become. Trying to defer all coverage of network topics until Chapter 7, its position in SiC4 delays important content significantly and, perhaps more importantly, makes for a long and broad network security chapter.
In readers had less direct contact with a network than now, and these readers had limited experience using a network prior to reading the book. Obviously readers in come with vastly more network exposure. Finally, privacy has been an important topic in the book in early editions, and its importance and coverage have grown as well.
The authors will again expand the coverage of privacy, expanding on topics such as web tracking and social networking. These additions cannot come without some pruning. Previously hot topics, such as trusted operating systems and multilevel databases, are being pared down.
The authors will also reconsider topics such as economics and management which, although interesting and important, appeal to a relatively small target audience. Pearson offers special pricing when you package your text with other student resources. If you're interested in creating a cost-saving package for your students, contact your Pearson rep. Charles Pfleeger is an internationally known expert on computer and communications security.
He was originally a professor at the University of Tennessee, leaving there to join computer security research and consulting companies Trusted Information Systems and Arca Systems later Exodus Communications and Cable and Wireless. Shari Lawrence Pfleeger is widely known as a software engineering and computer security researcher, most recently as a Senior Computer Scientist with the Rand Corporation and as Research Director of the Institute for Information Infrastructure Protection.
Margulies spent nine years at Sandia National Labs, researching and developing solutions to protect national security and critical infrastructure systems from advanced persistent threats. He then went on to NIST's National Cybersecurity Center of Excellence, where he worked with a variety of critical infrastructure companies to create industry-standard security architectures. In his free time, Mr. We're sorry! We don't recognize your username or password. Please try again.
The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. You have successfully signed out and will be required to sign back in should you need to download more resources. Security in Computing, 5th Edition.
Charles P. Description This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. As of Oct, , there are new, vastly improved PowerPoint slides for instructor use. New to This Edition. Share a link to All Resources. Instructor Resources. About the Author s. Previous editions.
Security in Computing, 4th Edition. Relevant Courses. Sign In We're sorry! Username Password Forgot your username or password? Sign Up Already have an access code? Instructor resource file download The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Signed out You have successfully signed out and will be required to sign back in should you need to download more resources.
On-line Supplement. Students, buy or rent this eText.
Security in Computing
View larger. Preview this title online. Request a copy. Download instructor resources.
Security in Computing, Fifth Edition
Security in Computing, 5th Edition
Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.