For courses in Computer/Network Security.
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association have named Computer Security: Principles and Practice the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.
Visit Stallings Companion Website at http://williamstallings.com/CompSec/CompSec1e.html for student and instructor resources and his Computer Science Student Resource site http://williamstallings.com/StudentSupport.html
Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required)
"synopsis" may belong to another edition of this title.
<> Computer Security: Principles and Practice
William Stallings and Lawrie Brown
A thorough, up-to-date survey of the entire discipline of computer security.
Security experts William Stallings and Lawrie Brown provide a comprehensive survey of computer security threats, technical approaches to the detection and prevention of security attacks, software security issues, and management issues.
Throughout, the authors focus on core principles, showing how they unify the field of computer securuity and demonstrating their applications in real-world systems and networks. They examine alternate design approaches to meeting security requirements and illuminate the standards that are central to today's security solutions.
Ideal for both academic and professional audiences, Computer Security offers exceptional clarity, careful organization, and extensive pedagogical support - including hundreds of carefully crafted practice problems.
About the Authors
William Stallings has won the Best Computer Science and Engineering Textbook award seven times. His Prentice Hall books include Operating Systems; Cryptography and Network Security; and Data and Computer Communications. Stallings consults widely with technology providers, customers, and researchers. He holds a Ph.D. in Computer Science from MIT. Dr. Lawrie Brown is Senior Lecturer at the School of Information Technology and Electrical Engineering at the University of New South Wales at the Australian Defence Force Academy, Canberra, Australia.
Comprehensive Web support at WilliamStallings.comAbout the Author:
<> William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 17 titles, and counting revised editions, a total of 41 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. He is a frequent lecturer and author of numerous technical papers. His books include Data and Computer Communications, Eighth Edition (Prentice Hall, 2007), which has become the standard in the field. Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
"About this title" may belong to another edition of this title.
Book Description U.S.A.: Prentice Hall, 2007. Soft cover. Book Condition: New. International Edition. Fast shipping from TX, This is an International Edition, same content as US edition, soft cover, cover page and ISBN may be different. Bookseller Inventory # ABE-15881450525
Book Description Prentice Hall. Soft cover. Book Condition: New. International Edition. 0136004245 Brand New Book. Premium International Edition with Same Contents. Fast Delivery. Bookseller Inventory # INDSKT-9788131733516
Book Description Softcover. Book Condition: New. Brand New; Shrink Wrapped; Paperback; Black & White or Color International Edition. ISBN and Cover page may differ but similar contents as US edition. GET IT FAST in 3-5 business days by DHL/FEDEX with tracking number. Books printed in English. No shipping to PO Box/APO/FPO address. In some instances the international textbooks may have different end chapter case studies and exercises. International Edition Textbooks may bear a label "Not for sale in the U.S. or Canada" and "Content may different from U.S. Edition" - printed only to discourage U.S. students from obtaining an affordable copy. The U.S. Supreme Court has asserted your right to purchase international editions, and ruled on this issue. Access code or CD is not provided with these editions, unless specified. We may ship the books from multiple warehouses across the globe, including India depending upon the availability of inventory storage. Customer satisfaction guaranteed. Bookseller Inventory # GFI1442809
Book Description Book Condition: New. New. Soft Cover International edition. Different ISBN and Cover image but contents are same as US edition.Perfect condition. Ship by express service to USA, Canada, Australia, France, Italy, UK, Germany and Netherland. Customer satisfaction our priority. Bookseller Inventory # ABE-190516-124015
Book Description Book Condition: Brand New. New. Soft Cover International edition. Different ISBN and Cover image but contents are same as US edition. Customer Satisfaction guaranteed!!. Bookseller Inventory # SHAK124015
Book Description Book Condition: New. Brand New Paperback International Edition.We Ship to PO BOX Address also. EXPEDITED shipping option also available for faster delivery. Bookseller Inventory # AUSB-7624
Book Description Paperback. Book Condition: New. New Softcover International Edition, Printed in Black and White, Only USPS Media mail Shipping ONLY, Different ISBN, Same Content As US edition, Book Cover may be Different, in English Language. Bookseller Inventory # 14271
Book Description West Nyack, New York, U.S.A.: Prentice Hall, 2007. Soft cover. Book Condition: New. No Jacket. This book is BRAND NEW Soft cover International edition with black and white printing. ISBN number and cover page may be different but contents identical to the US edition word by word. Book is in English language. Bookseller Inventory # aw100
Book Description Prentice Hall, 2007. Book Condition: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Notation Preface Chapter 0 Reader's and Instructor's Guide 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards Chapter 1 Overview 1.1 Computer Security Concepts 1.2 Threats, Attacks, and Assets 1.3 Security Functional Requirements 1.4 A Security Architecture for Open Systems 1.5 The Scope of Computer Security 1.6 Computer Security Trends 1.7 Computer Security Strategy 1.8 Recommended Reading and Web Sites 1.9 Key Terms, Review Questions, and Problems Appendix 1A Signficant Security Standards and Documents PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools 2.1 Confidentiality with Symmetric Encryption 2.2 Message Authentication and Hash Functions 2.3 Public-Key Encryption 2.4 Digital Signatures and Key Management 2.5 Random and Pseudorandom Numbers 2.6 Practical Application: Encryption of Stored Data 2.7 Recommended Reading and Web Sites 2.8 Key Terms, Review Questions, and Problems Chapter 3 User Authentication 3.1 Means of Authentication 3.2 Password-Based Authentication 3.3 Token-Based Authentication 3.4 Biometric Authentication 3.5 Remote User Authentication 3.6 Security Issues for User Authentication 3.7 Practical Application: An Iris Biometric System 3.8 Case Study: Security Problems for ATM Systems 3.9 Recommended Reading and Web Sites 3.10 Key Terms, Review Questions, and Problems Chapter 4 Access Control 4.1 Access Control Principles 4.2 Subjects, Objects, and Access Rights 4.3 Discretionary Access Control 4.4 Example: UNIX File Access Control 4.5 Role-Based Access Control 4.6 Case Study: RBAC System for a Bank 4.7 Recommended Reading and Web Sites 4.8 Key Terms, Review Questions, and Problems Chapter 5 Database Security 5.1 Relational Databases 5.2 Database Access Control 5.3 Inference 5.4 Statistical Databases 5.5 Database Encryption 5.6 Recommended Reading 5.7 Key Terms, Review Questions, and Problems Chapter 6 Intrusion Detection 6.1 Intruders 6.2 Intrusion Detection 6.3 Host-Based Intrusion Detection 6.4 Distr. Bookseller Inventory # ABE_book_new_0136004245
Book Description Prentice Hall, 2007. Hardcover. Book Condition: New. book. Bookseller Inventory # 0136004245