ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer Security: Principles and Practice

دانلود کتاب امنیت کامپیوتر: اصول و تمرین

Computer Security: Principles and Practice

مشخصات کتاب

Computer Security: Principles and Practice

دسته بندی: امنیت
ویرایش: 2nd 
نویسندگان:   
سری:  
ISBN (شابک) : 0132775069, 9780132775069 
ناشر: Prentice Hall 
سال نشر: 2011 
تعداد صفحات: 817 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 مگابایت 

قیمت کتاب (تومان) : 34,000



کلمات کلیدی مربوط به کتاب امنیت کامپیوتر: اصول و تمرین: مهندسی انفورماتیک و کامپیوتر، امنیت اطلاعات



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 20


در صورت تبدیل فایل کتاب Computer Security: Principles and Practice به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب امنیت کامپیوتر: اصول و تمرین نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب امنیت کامپیوتر: اصول و تمرین



​​ Computer Security: Principles and Practice, 2e, ایده آل است برای دوره های آموزشی کامپیوتر/امنیت شبکه.< /i>

 

در سال های اخیر نیاز به آموزش در زمینه امنیت رایانه و موارد مرتبط موضوعات به طور چشمگیری رشد کرده است - و برای هر کسی که در رشته علوم کامپیوتر یا مهندسی کامپیوتر تحصیل می کند ضروری است. این تنها متن موجود برای ارائه پوشش یکپارچه، جامع و به روز از طیف گسترده ای از موضوعات در این موضوع است. این کتاب علاوه بر یک برنامه آموزشی گسترده، پشتیبانی بی‌نظیری از پروژه‌های پژوهشی و مدل‌سازی ارائه می‌کند و به دانش‌آموزان دیدگاه وسیع‌تری می‌دهد.

​​

انجمن نویسندگان متن و دانشگاهی به نام Computer Security: Principles and Practice، 1e، برنده جایزه تعالی کتاب درسی برای بهترین کتاب درسی علوم کامپیوتر در سال 2008.



توضیحاتی درمورد کتاب به خارجی

Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.

 

In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.  In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. 


The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.




فهرست مطالب

Cover
Title Page
Copyright Page
Contents
Online Resources
Notation
About the Authors
Preface
Chapter 0 Reader’s and Instructor’s Guide
	0.1 Outline of This Book
	0.2 A Roadmap for Readers and Instructors
	0.3 Support for CISSP Certification
	0.4 Internet and Web Resources
	0.5 Standards
Chapter 1 Overview
	1.1 Computer Security Concepts
	1.2 Threats, Attacks, and Assets
	1.3 Security Functional Requirements
	1.4 A Security Architecture for Open Systems
	1.5 Computer Security Trends
	1.6 Computer Security Strategy
	1.7 Recommended Reading and Web Sites
	1.8 Key Terms, Review Questions, and Problems
PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
	Chapter 2 Cryptographic Tools
		2.1 Confidentiality with Symmetric Encryption
		2.2 Message Authentication and Hash Functions
		2.3 Public-Key Encryption
		2.4 Digital Signatures and Key Management
		2.5 Random and Pseudorandom Numbers
		2.6 Practical Application: Encryption of Stored Data
		2.7 Recommended Reading and Web Sites
		2.8 Key Terms, Review Questions, and Problems
	Chapter 3 User Authentication
		3.1 Means of Authentication
		3.2 Password-Based Authentication
		3.3 Token-Based Authentication
		3.4 Biometric Authentication
		3.5 Remote User Authentication
		3.6 Security Issues for User Authentication
		3.7 Practical Application: An Iris Biometric System
		3.8 Case Study: Security Problems for ATM Systems
		3.9 Recommended Reading and Web Sites
		3.10 Key Terms, Review Questions, and Problems
	Chapter 4 Access Control
		4.1 Access Control Principles
		4.2 Subjects, Objects, and Access Rights
		4.3 Discretionary Access Control
		4.4 Example: UNIX File Access Control
		4.5 Role-Based Access Control
		4.6 Case Study: RBAC System for a Bank
		4.7 Recommended Reading and Web Site
		4.8 Key Terms, Review Questions, and Problems
	Chapter 5 Database Security
		5.1 The Need for Database Security
		5.2 Database Management Systems
		5.3 Relational Databases
		5.4 Database Access Control
		5.5 Inference
		5.6 Statistical Databases
		5.7 Database Encryption
		5.8 Cloud Security
		5.9 Recommended Reading and Web Site
		5.10 Key Terms, Review Questions, and Problems
	Chapter 6 Malicious Software
		6.1 Types of Malicious Software (Malware)
		6.2 Propagation—Infected Content—Viruses
		6.3 Propagation—Vulnerability Exploit—Worms
		6.4 Propagation—Social Engineering—SPAM E-mail, Trojans
		6.5 Payload—System Corruption
		6.6 Payload—Attack Agent—Zombie, Bots
		6.7 Payload—Information Theft—Keyloggers, Phishing, Spyware
		6.8 Payload—Stealthing—Backdoors, Rootkits
		6.9 Countermeasures
		6.10 Recommended Reading and Web Sites
		6.11 Key Terms, Review Questions, and Problems
	Chapter 7 Denial-of-Service Attacks
		7.1 Denial-of-Service Attacks
		7.2 Flooding Attacks
		7.3 Distributed Denial-of-Service Attacks
		7.4 Application-Based Bandwidth Attacks
		7.5 Reflector and Amplifier Attacks
		7.6 Defenses Against Denial-of-Service Attacks
		7.7 Responding to a Denial-of-Service Attack
		7.8 Recommended Reading and Web Sites
		7.9 Key Terms, Review Questions, and Problems
	Chapter 8 Intrusion Detection
		8.1 Intruders
		8.2 Intrusion Detection
		8.3 Host-Based Intrusion Detection
		8.4 Distributed Host-Based Intrusion Detection
		8.5 Network-Based Intrusion Detection
		8.6 Distributed Adaptive Intrusion Detection
		8.7 Intrusion Detection Exchange Format
		8.8 Honeypots
		8.9 Example System: Snort
		8.10 Recommended Reading and Web Sites
		8.11 Key Terms, Review Questions, and Problems
	Chapter 9 Firewalls and Intrusion Prevention Systems
		9.1 The Need for Firewalls
		9.2 Firewall Characteristics
		9.3 Types of Firewalls
		9.4 Firewall Basing
		9.5 Firewall Location and Configurations
		9.6 Intrusion Prevention Systems
		9.7 Example: Unified Threat Management Products
		9.8 Recommended Reading and Web Site
		9.9 Key Terms, Review Questions, and Problems
PART TWO: SOFTWARE SECURITY AND TRUSTED SYSTEMS
	Chapter 10 Buffer Overflow
		10.1 Stack Overflows
		10.2 Defending Against Buffer Overflows
		10.3 Other Forms of Overflow Attacks
		10.4 Recommended Reading and Web Sites
		10.5 Key Terms, Review Questions, and Problems
	Chapter 11 Software Security
		11.1 Software Security Issues
		11.2 Handling Program Input
		11.3 Writing Safe Program Code
		11.4 Interacting with the Operating System and Other Programs
		11.5 Handling Program Output
		11.6 Recommended Reading and Web Sites
		11.7 Key Terms, Review Questions, and Problems
	Chapter 12 Operating System Security
		12.1 Introduction to Operating System Security
		12.2 System Security Planning
		12.3 Operating Systems Hardening
		12.4 Application Security
		12.5 Security Maintenance
		12.6 Linux/Unix Security
		12.7 Windows Security
		12.8 Virtualization Security
		12.9 Recommended Reading and Web Sites
		12.10 Key Terms, Review Questions, and Problems
	Chapter 13 Trusted Computing and Multilevel Security
		13.1 The Bell-LaPadula Model for Computer Security
		13.2 Other Formal Models for Computer Security
		13.3 The Concept of Trusted Systems
		13.4 Application of Multilevel Security
		13.5 Trusted Computing and the Trusted Platform Module
		13.6 Common Criteria for Information Technology Security Evaluation
		13.7 Assurance and Evaluation
		13.8 Recommended Reading and Web Sites
		13.9 Key Terms, Review Questions, and Problems
PART THREE: MANAGEMENT ISSUES
	Chapter 14 IT Security Management and Risk Assessment
		14.1 IT Security Management
		14.2 Organizational Context and Security Policy
		14.3 Security Risk Assessment
		14.4 Detailed Security Risk Analysis
		14.5 Case Study: Silver Star Mines
		14.6 Recommended Reading and Web Sites
		14.7 Key Terms, Review Questions, and Problems
	Chapter 15 IT Security Controls, Plans, and Procedures
		15.1 IT Security Management Implementation
		15.2 Security Controls or Safeguards
		15.3 IT Security Plan
		15.4 Implementation of Controls
		15.5 Implementation Follow-up
		15.6 Case Study: Silver Star Mines
		15.7 Recommended Reading
		15.8 Key Terms, Review Questions, and Problems
	Chapter 16 Physical and Infrastructure Security
		16.1 Overview
		16.2 Physical Security Threats
		16.3 Physical Security Prevention and Mitigation Measures
		16.4 Recovery from Physical Security Breaches
		16.5 Example: A Corporate Physical Security Policy
		16.6 Integration of Physical and Logical Security
		16.7 Recommended Reading and Web Sites
		16.8 Key Terms, Review Questions, and Problems
	Chapter 17 Human Resources Security
		17.1 Security Awareness, Training, and Education
		17.2 Employment Practices and Policies
		17.3 E-Mail and Internet Use Policies
		17.4 Computer Security Incident Response Teams
		17.5 Recommended Reading and Web Sites
		17.6 Key Terms, Review Questions, and Problems
	Chapter 18 Security Auditing
		18.1 Security Auditing Architecture
		18.2 The Security Audit Trail
		18.3 Implementing the Logging Function
		18.4 Audit Trail Analysis
		18.5 Example: An Integrated Approach
		18.6 Recommended Reading and Web Site
		18.7 Key Terms, Review Questions, and Problems
	Chapter 19 Legal and Ethical Aspects
		19.1 Cybercrime and Computer Crime
		19.2 Intellectual Property
		19.3 Privacy
		19.4 Ethical Issues
		19.5 Recommended Reading and Web Sites
		19.6 Key Terms, Review Questions, and Problems
PART FOUR: CRYPTOGRAPHIC ALGORITHMS
	Chapter 20 Symmetric Encryption and Message Confidentiality
		20.1 Symmetric Encryption Principles
		20.2 Data Encryption Standard
		20.3 Advanced Encryption Standard
		20.4 Stream Ciphers and RC4
		20.5 Cipher Block Modes of Operation
		20.6 Location of Symmetric Encryption Devices
		20.7 Key Distribution
		20.8 Recommended Reading and Web Sites
		20.9 Key Terms, Review Questions, and Problems
	Chapter 21 Public-Key Cryptography and Message Authentication
		21.1 Secure Hash Functions
		21.2 HMAC
		21.3 The RSA Public-Key Encryption Algorithm
		21.4 Diffie-Hellman and Other Asymmetric Algorithms
		21.5 Recommended Reading and Web Sites
		21.6 Key Terms, Review Questions, and Problems
PART FIVE: NETWORK SECURITY
	Chapter 22 Internet Security Protocols and Standards
		22.1 Secure E-mail and S/MIME
		22.2 DomainKeys Identified Mail
		22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
		22.4 HTTPS
		22.5 IPv4 and IPv6 Security
		22.6 Recommended Reading and Web Sites
		22.7 Key Terms, Review Questions, and Problems
	Chapter 23 Internet Authentication Applications
		23.1 Kerberos
		23.2 X.509
		23.3 Public-Key Infrastructure
		23.4 Federated Identity Management
		23.5 Recommended Reading and Web Sites
		23.6 Key Terms, Review Questions, and Problems
	Chapter 24 Wireless Network Security
		24.1 Wireless Security Overview
		24.2 IEEE 802.11 Wireless LAN Overview
		24.3 IEEE 802.11i Wireless LAN Security
		24.4 Recommended Reading and Web Sites
		24.5 Key Terms, Review Questions, and Problems
APPENDICES
	Appendix A: Projects and Other Student Exercises for Teaching Computer Security
		A.1 Hacking Project
		A.2 Laboratory Exercises
		A.3 Research Projects
		A.4 Programming Projects
		A.5 Practical Security Assessments
		A.6 Firewall Projects
		A.7 Case Studies
		A.8 Writing Assignments
		A.9 Reading/Report Assignments
References
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X
	Z
Credits




نظرات کاربران