دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: امنیت ویرایش: 2nd نویسندگان: William Stallings. Lawrie Brown سری: ISBN (شابک) : 0132775069, 9780132775069 ناشر: Prentice Hall سال نشر: 2011 تعداد صفحات: 817 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 مگابایت
کلمات کلیدی مربوط به کتاب امنیت کامپیوتر: اصول و تمرین: مهندسی انفورماتیک و کامپیوتر، امنیت اطلاعات
در صورت تبدیل فایل کتاب Computer Security: Principles and Practice به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت کامپیوتر: اصول و تمرین نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Computer Security: Principles and Practice, 2e, ایده آل است برای دوره های آموزشی کامپیوتر/امنیت شبکه.< /i>
در سال های اخیر نیاز به آموزش در زمینه امنیت رایانه و
موارد مرتبط موضوعات به طور چشمگیری رشد کرده است - و برای هر
کسی که در رشته علوم کامپیوتر یا مهندسی کامپیوتر تحصیل می کند
ضروری است. این تنها متن موجود برای ارائه پوشش یکپارچه، جامع و
به روز از طیف گسترده ای از موضوعات در این موضوع است. این کتاب
علاوه بر یک برنامه آموزشی گسترده، پشتیبانی بینظیری از
پروژههای پژوهشی و مدلسازی ارائه میکند و به دانشآموزان
دیدگاه وسیعتری میدهد.
انجمن نویسندگان متن و دانشگاهی به نام Computer Security: Principles and Practice، 1e، برنده جایزه تعالی کتاب درسی برای بهترین کتاب درسی علوم کامپیوتر در سال 2008.
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.
In recent years, the need for education in computer security
and related topics has grown dramatically – and is
essential for anyone studying Computer Science or Computer
Engineering. This is the only text available to provide
integrated, comprehensive, up-to-date coverage of the broad
range of topics in this subject. In addition to an
extensive pedagogical program, the book provides unparalleled
support for both research and modeling projects, giving
students a broader perspective.
The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.
Cover Title Page Copyright Page Contents Online Resources Notation About the Authors Preface Chapter 0 Reader’s and Instructor’s Guide 0.1 Outline of This Book 0.2 A Roadmap for Readers and Instructors 0.3 Support for CISSP Certification 0.4 Internet and Web Resources 0.5 Standards Chapter 1 Overview 1.1 Computer Security Concepts 1.2 Threats, Attacks, and Assets 1.3 Security Functional Requirements 1.4 A Security Architecture for Open Systems 1.5 Computer Security Trends 1.6 Computer Security Strategy 1.7 Recommended Reading and Web Sites 1.8 Key Terms, Review Questions, and Problems PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES Chapter 2 Cryptographic Tools 2.1 Confidentiality with Symmetric Encryption 2.2 Message Authentication and Hash Functions 2.3 Public-Key Encryption 2.4 Digital Signatures and Key Management 2.5 Random and Pseudorandom Numbers 2.6 Practical Application: Encryption of Stored Data 2.7 Recommended Reading and Web Sites 2.8 Key Terms, Review Questions, and Problems Chapter 3 User Authentication 3.1 Means of Authentication 3.2 Password-Based Authentication 3.3 Token-Based Authentication 3.4 Biometric Authentication 3.5 Remote User Authentication 3.6 Security Issues for User Authentication 3.7 Practical Application: An Iris Biometric System 3.8 Case Study: Security Problems for ATM Systems 3.9 Recommended Reading and Web Sites 3.10 Key Terms, Review Questions, and Problems Chapter 4 Access Control 4.1 Access Control Principles 4.2 Subjects, Objects, and Access Rights 4.3 Discretionary Access Control 4.4 Example: UNIX File Access Control 4.5 Role-Based Access Control 4.6 Case Study: RBAC System for a Bank 4.7 Recommended Reading and Web Site 4.8 Key Terms, Review Questions, and Problems Chapter 5 Database Security 5.1 The Need for Database Security 5.2 Database Management Systems 5.3 Relational Databases 5.4 Database Access Control 5.5 Inference 5.6 Statistical Databases 5.7 Database Encryption 5.8 Cloud Security 5.9 Recommended Reading and Web Site 5.10 Key Terms, Review Questions, and Problems Chapter 6 Malicious Software 6.1 Types of Malicious Software (Malware) 6.2 Propagation—Infected Content—Viruses 6.3 Propagation—Vulnerability Exploit—Worms 6.4 Propagation—Social Engineering—SPAM E-mail, Trojans 6.5 Payload—System Corruption 6.6 Payload—Attack Agent—Zombie, Bots 6.7 Payload—Information Theft—Keyloggers, Phishing, Spyware 6.8 Payload—Stealthing—Backdoors, Rootkits 6.9 Countermeasures 6.10 Recommended Reading and Web Sites 6.11 Key Terms, Review Questions, and Problems Chapter 7 Denial-of-Service Attacks 7.1 Denial-of-Service Attacks 7.2 Flooding Attacks 7.3 Distributed Denial-of-Service Attacks 7.4 Application-Based Bandwidth Attacks 7.5 Reflector and Amplifier Attacks 7.6 Defenses Against Denial-of-Service Attacks 7.7 Responding to a Denial-of-Service Attack 7.8 Recommended Reading and Web Sites 7.9 Key Terms, Review Questions, and Problems Chapter 8 Intrusion Detection 8.1 Intruders 8.2 Intrusion Detection 8.3 Host-Based Intrusion Detection 8.4 Distributed Host-Based Intrusion Detection 8.5 Network-Based Intrusion Detection 8.6 Distributed Adaptive Intrusion Detection 8.7 Intrusion Detection Exchange Format 8.8 Honeypots 8.9 Example System: Snort 8.10 Recommended Reading and Web Sites 8.11 Key Terms, Review Questions, and Problems Chapter 9 Firewalls and Intrusion Prevention Systems 9.1 The Need for Firewalls 9.2 Firewall Characteristics 9.3 Types of Firewalls 9.4 Firewall Basing 9.5 Firewall Location and Configurations 9.6 Intrusion Prevention Systems 9.7 Example: Unified Threat Management Products 9.8 Recommended Reading and Web Site 9.9 Key Terms, Review Questions, and Problems PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS Chapter 10 Buffer Overflow 10.1 Stack Overflows 10.2 Defending Against Buffer Overflows 10.3 Other Forms of Overflow Attacks 10.4 Recommended Reading and Web Sites 10.5 Key Terms, Review Questions, and Problems Chapter 11 Software Security 11.1 Software Security Issues 11.2 Handling Program Input 11.3 Writing Safe Program Code 11.4 Interacting with the Operating System and Other Programs 11.5 Handling Program Output 11.6 Recommended Reading and Web Sites 11.7 Key Terms, Review Questions, and Problems Chapter 12 Operating System Security 12.1 Introduction to Operating System Security 12.2 System Security Planning 12.3 Operating Systems Hardening 12.4 Application Security 12.5 Security Maintenance 12.6 Linux/Unix Security 12.7 Windows Security 12.8 Virtualization Security 12.9 Recommended Reading and Web Sites 12.10 Key Terms, Review Questions, and Problems Chapter 13 Trusted Computing and Multilevel Security 13.1 The Bell-LaPadula Model for Computer Security 13.2 Other Formal Models for Computer Security 13.3 The Concept of Trusted Systems 13.4 Application of Multilevel Security 13.5 Trusted Computing and the Trusted Platform Module 13.6 Common Criteria for Information Technology Security Evaluation 13.7 Assurance and Evaluation 13.8 Recommended Reading and Web Sites 13.9 Key Terms, Review Questions, and Problems PART THREE: MANAGEMENT ISSUES Chapter 14 IT Security Management and Risk Assessment 14.1 IT Security Management 14.2 Organizational Context and Security Policy 14.3 Security Risk Assessment 14.4 Detailed Security Risk Analysis 14.5 Case Study: Silver Star Mines 14.6 Recommended Reading and Web Sites 14.7 Key Terms, Review Questions, and Problems Chapter 15 IT Security Controls, Plans, and Procedures 15.1 IT Security Management Implementation 15.2 Security Controls or Safeguards 15.3 IT Security Plan 15.4 Implementation of Controls 15.5 Implementation Follow-up 15.6 Case Study: Silver Star Mines 15.7 Recommended Reading 15.8 Key Terms, Review Questions, and Problems Chapter 16 Physical and Infrastructure Security 16.1 Overview 16.2 Physical Security Threats 16.3 Physical Security Prevention and Mitigation Measures 16.4 Recovery from Physical Security Breaches 16.5 Example: A Corporate Physical Security Policy 16.6 Integration of Physical and Logical Security 16.7 Recommended Reading and Web Sites 16.8 Key Terms, Review Questions, and Problems Chapter 17 Human Resources Security 17.1 Security Awareness, Training, and Education 17.2 Employment Practices and Policies 17.3 E-Mail and Internet Use Policies 17.4 Computer Security Incident Response Teams 17.5 Recommended Reading and Web Sites 17.6 Key Terms, Review Questions, and Problems Chapter 18 Security Auditing 18.1 Security Auditing Architecture 18.2 The Security Audit Trail 18.3 Implementing the Logging Function 18.4 Audit Trail Analysis 18.5 Example: An Integrated Approach 18.6 Recommended Reading and Web Site 18.7 Key Terms, Review Questions, and Problems Chapter 19 Legal and Ethical Aspects 19.1 Cybercrime and Computer Crime 19.2 Intellectual Property 19.3 Privacy 19.4 Ethical Issues 19.5 Recommended Reading and Web Sites 19.6 Key Terms, Review Questions, and Problems PART FOUR: CRYPTOGRAPHIC ALGORITHMS Chapter 20 Symmetric Encryption and Message Confidentiality 20.1 Symmetric Encryption Principles 20.2 Data Encryption Standard 20.3 Advanced Encryption Standard 20.4 Stream Ciphers and RC4 20.5 Cipher Block Modes of Operation 20.6 Location of Symmetric Encryption Devices 20.7 Key Distribution 20.8 Recommended Reading and Web Sites 20.9 Key Terms, Review Questions, and Problems Chapter 21 Public-Key Cryptography and Message Authentication 21.1 Secure Hash Functions 21.2 HMAC 21.3 The RSA Public-Key Encryption Algorithm 21.4 Diffie-Hellman and Other Asymmetric Algorithms 21.5 Recommended Reading and Web Sites 21.6 Key Terms, Review Questions, and Problems PART FIVE: NETWORK SECURITY Chapter 22 Internet Security Protocols and Standards 22.1 Secure E-mail and S/MIME 22.2 DomainKeys Identified Mail 22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 22.4 HTTPS 22.5 IPv4 and IPv6 Security 22.6 Recommended Reading and Web Sites 22.7 Key Terms, Review Questions, and Problems Chapter 23 Internet Authentication Applications 23.1 Kerberos 23.2 X.509 23.3 Public-Key Infrastructure 23.4 Federated Identity Management 23.5 Recommended Reading and Web Sites 23.6 Key Terms, Review Questions, and Problems Chapter 24 Wireless Network Security 24.1 Wireless Security Overview 24.2 IEEE 802.11 Wireless LAN Overview 24.3 IEEE 802.11i Wireless LAN Security 24.4 Recommended Reading and Web Sites 24.5 Key Terms, Review Questions, and Problems APPENDICES Appendix A: Projects and Other Student Exercises for Teaching Computer Security A.1 Hacking Project A.2 Laboratory Exercises A.3 Research Projects A.4 Programming Projects A.5 Practical Security Assessments A.6 Firewall Projects A.7 Case Studies A.8 Writing Assignments A.9 Reading/Report Assignments References Index A B C D E F G H I K L M N O P Q R S T U V W X Z Credits