Security in Computing - Hardcover

Pfleeger, Shari Lawrence

  • 3.72 out of 5 stars
    195 ratings by Goodreads
 
9780130355485: Security in Computing

Synopsis

Security in Computing, Third Edition is a sweeping revision of the field's classic guide to computer security. Thoroughly updated to reflect the latest Internet-based threats, it shows how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. It offers exceptionally clear and accessible coverage of cryptography and other technical issues; security administration; law, privacy, and ethics. New coverage includes wireless security, intrusion detection, quantum cryptography, biometrics, DRM, AES, honeypots, online privacy, and much more.

"synopsis" may belong to another edition of this title.

About the Author

CHARLES P. PFLEEGER is a Master Security Architect for Exodus, a Cable and Wireless service, the world's premier web hosting and Internet solutions provider. He regularly advises clients on secure design and implementation of network applications and architectures.

SHARI LAWRENCE PFLEEGER, senior researcher for RAND Corporation, is author of eight books on software engineering, measurement, and quality, including Software Engineering: Theory and Practice, Second Edition (Prentice Hall PTR). She was named by The Journal of Systems and Software as one of the world's top software engineering researchers.

Foreword by Willis H. Ware.

From the Back Cover

The classic guide to information security—fully updated for the latest attacks and countermeasures

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats and vulnerabilities, and offers practical guidance for responding to them.

  • Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more
  • Security in Internet-based, distributed, desktop and traditional centralized applications
  • New attacks, including scripted vulnerability probing, denial of service, and buffer overflows—with symptoms and cures
  • Clear, accessible introduction to cryptography—without sophisticated math
  • Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography
  • Thoroughly revamped coverage of software engineering practices designed to enhance program security
  • Expanded coverage of risk management, contingency planning, and security policies
  • Detailed presentation of protection in general-purpose and trusted operating systems
  • Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references

Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security.

"About this title" may belong to another edition of this title.

Other Popular Editions of the Same Title