• Complain

Charles P. Pfleeger - Security in computing

Here you can read online Charles P. Pfleeger - Security in computing full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2002, publisher: Prentice Hall PTR, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Charles P. Pfleeger Security in computing

Security in computing: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Security in computing" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Appropriate for beginning to intermediate courses in computer security.This sweeping revision of the classic computer security book provides an authoritative overview of computer security for every type of system, from traditional centralized systems to distributed networks and the Internet. The Third Edition has been updated to reflect the state-of-the-art in networking; cryptography; program and operating system security; administration; legal, privacy, and ethical issues, and much more. It combines core computer science concepts related to operating systems, networks, data bases, and programming, with accessible discussions of the use of cryptography and protocols. The book describes each important area from a developers or users point of view, lays out the security vulnerabilities and threats, and follows countermeasures to address them. Their books layered approach is ideal for instructors who wish to customize courses based on their unique requirements. They also provide extensive pedagogical resourcesincluding overviews, end-of-chapter reviews, lists of key terms, and updated exercises and references.The authors are recognized experts in their fields. Lead author Dr. Charles P. Pfleeger, CISSP, is currently Master Security Architect for Cable & Wireless, one of the worlds leading providers of Internet and secure infrastructure services. Co-author Dr. Shari Lawrence Pfleeger is a Senior Researcher at RAND Corporation, a not-for-profit company providing strategy and decision-making support in the public interest. They are the authors of more than a dozen previous books on computer security, software engineering, software measurement, software quality, and programming.

Charles P. Pfleeger: author's other books


Who wrote Security in computing? Find out the surname, the name of the author of the book and a list of all author's works by series.

Security in computing — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Security in computing" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Bibliography

A few notes on the bibliography: URLs are used sparingly because the pages they reference tend to move, disappear, or change. URLs are given for some older papers that are hard to locate any other way and that are posted at sites that will probably serve as archives.

The following abbreviations are used in this bibliography.

ACM

Association for Computing Machinery

Comm

Communications

Conf

Conference

Corp

Corporation

Dept

Department

IEEE

Institute for Electrical and Electronics Engineers

Proc

Proceedings

Symp

Symposium

Trans

Transactions

Univ

University

[ABA94] Abadi, M., and Needham, R. "Prudent Engineering Practice for Cryptographic Protocols." Proc IEEE Symp on Security & Privacy , 1994, p122136.

[ABB76] Abbott, R., et al. "Security Analysis and Enhancements of Computer Operating Systems." NBS Tech Report , NBSIR-76-1041, 1976.

[ABR87] Abrams, M., and Podell, H. Computer & Network SecurityTutorial . IEEE Computer Society Press, 1987.

[ACT02] ActivNewsletter. "Lloyd's TSB Secures Online Banking Services with ActivCard Gold." ActivNewsletter , Feb 2002.

[ADA89] Adam, N., and Wortman, J. "Security-Control Methods for Statistical Databases: A Study." ACM Computing Surveys , v21 n4, Dec 1989, p515556.

[ADA92a] Adam, J. "Threats and Countermeasures." IEEE Spectrum , v29 n8, Aug 1992, p2128.

[ADA92b] Adam, J. "Cryptography = Privacy?" IEEE Spectrum , v29 n8, Aug 1992, p2935.

[ADA92c] Adam, J. "Data Security." IEEE Spectrum , v29 n8, Aug 1992, p1920.

[ADA92d] Adam, J., ed. "A Security Roundtable." IEEE Spectrum , v29 n8, Aug 1992, p4144.

[ADA95] Adam, J. "The Privacy Problem." IEEE Spectrum , v32 n12, Dec 1995, p4652.

[ADL82] Adleman, L. "On Breaking the Iterated MerkleHellman Public-Key Cryptosystem." Proc Crypto Conf , 1982, p303308.

[ADL83] Adleman, L. "On Breaking Generalized Knapsack Public Key Cryptosystems." Proc ACM Symp Theory of Computing , 1983, p402412.

[AFS83] AFSB (Air Force Studies Board). "Multilevel Data Management Security." National Academy of Sciences Report , 1983.

[AGN84] Agnew, G., et al. "Secrecy and Privacy in a Local Area Network Environment." Proc Eurocrypt Conf , 1984, p349357.

[AGN88] Agnew, G., et al. "A Secure Public Key Protocol Based on Discrete Exponentiation." Proc Eurocrypt Conf , 1988.

[AGR00] Agrawal, R., and Srikant, R. "Privacy-Preserving Data Mining." Proc ACM SIGMOD Conf on Management of Data , May 2000.

[AIR00] U.S. Air Force. "Operational Risk Management." Air Force Policy Directive , 90-9, 1 Apr 2000.

[AKL83] Akl, S. "Digital Signatures: A Tutorial Survey." IEEE Computer , v16 n2, Feb 1983, p1526.

[ALB01] Alberts, C., et al. "OCTAVE Catalog of Practices." Software Engineering Institute Technical Report , CMU/SEI-2001-TR-020, Oct 2001.

[ALB99] Alberts, C., et al. "Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)" Software Engineering Institute Technical Report , CMU/SEI-99-TR-017, Jun 1999.

[ALE96] Aleph One. "Smashing the Stack for Fun and Profit." Phrack , v7 n49, Nov 1996.

[ALL99] Allen, J., et al. "State of the Practice of Intrusion Detection Technologies." Software Engineering Institute Technical Report , CMU/SEI-99-TR-028, 1999.

[AME83] Ames, S., et al. "Security Kernel Design and Implementation: An Introduction." IEEE Computer , v16 n7, Jul 1983, p1423.

[AND01] Anderson, R. Security Engineering: Guide to Building Dependable Distributed Systems . Wiley, 2001.

[AND02] Anderson, R. "Security in Open versus Closed SystemsThe Dance of Boltzmann, Coase and Moore." Proc Open Source Software Conf: Economics, Law and Policy , Toulouse, France, 21 Jun 2002.

[AND02a] Anderson, R. "Unsettling Parallels Between Security and the Environment." Presentation at Univ of California Berkeley Workshop , 2002.

[AND72] Anderson, J. "Computer Security Technology Planning Study." U.S. Air Force Electronic Systems Division , TR-73-51, Oct 1972. URL: http://csrc.nist.gov/publications/history/ande72.pdf.

[AND80] Anderson, J. "Computer Security Threat Monitoring and Surveillance." James P. Anderson Co. Technical Report , 1980.

[AND82] Anderson, J. "Accelerating Computer Security Innovation." Proc IEEE Symp on Security & Privacy , 1982, p9197.

[AND85] Anderson, J. "A Unification of Computer and Network Security Concepts." Proc IEEE Symp on Security & Privacy , 1985, p7787.

[AND94] Anderson, R. "Why Cryptosystems Fail." Comm of the ACM , v37 n11, Nov 1994, p3241.

[AND98] Anderson, R. "The DeCODE Proposal for an Icelandic Health Database." unpublished report , 20 Oct 1998.

[AND98a] Anderson, R., et al. "Serpent: A Proposal for the Advanced Encryption Standard." unpublished report , undated. URL: http://www.cs.technion.ac.il/~biham/Reports/Serpent.

[ANT02] Antn, P., et al. "Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology." RAND Corp Technical Report , MR-1601-DARPA, 2002.

[ARB97] Arbaugh, W., et al. "A Secure and Reliable Bootstrap Architecture." Proc IEEE Symp on Security & Privacy , 1997, p6571.

[ASL95] Aslam, T. "A Taxonomy of Security Faults in the UNIX Operating System." Purdue Univ Dept of Computer Science Master's Thesis , Aug 1995.

[ATT76] Attanasio, C., et al. "A Study of VM/370 Integrity." IBM Systems Journal , v15 n1, 1976, p102116.

[BAD89] Badger, L. "A Model for Specifying Multi-Granularity Integrity Policies." Proc IEEE Symp on Security & Privacy , 1989, p269277.

[BAD91a] Badger, L. "Covert Channel Analysis Planning for Large Systems." TIS Technical Report , Trusted Information Systems, Feb 1991.

[BAD91b] Badger, L. "TMach Covert Channel Analysis Plan." TIS Technical Report , Trusted Information Systems, Jan 1991.

[BAH02] Bahadur, G., et al. Privacy Defended: How to Protect Your Privacy and Secure Your PC . Que, 2002.

[BAL85] Baldwin, R., and Gramlich, W. "Cryptographic Protocol for Trustable Match Making." Proc IEEE Symp on Security & Privacy , 1985.

[BAL93] Balenson, D. "Privacy Enhancement for Internet Electronic Mail, Part III." Internet report , RFC 1423: Algorithms, Modes, Identifiers, Feb 1993.

[BAM82] Bamford, J. The Puzzle Palace . Houghton Mifflin, 1982.

[BAR90] Barker, W., and Pfleeger, C. "Civil and Military Applications of Trusted Systems Criteria." TIS Technical Report , 304, Feb 1990.

[BAR92] Barlow, J. "Decrypting the Puzzle Palace." Comm of the ACM , v35 n7, Jul 1992, p2531.

[BAR99] Barwick, C., et al. "The MARS Encryption Algorithm." unpublished IBM Corp Technical Report , 27 Aug 1999. URL: http://www.research.ibm.com/security/mars.html.

[BEA88] Beauchemin, P., et al. "The Generation of Random Numbers That Are Probably Prime." Journal Cryptology , v1 n1, 1988, p5364.

[BEC80] Beck, L. "A Security Mechanism for Statistical Data Bases." ACM Trans on Data Base Systems , v5 n3, Sep 1980, p316338.

[BEK82] Beker, H., and Piper, F. Cipher Systems . Northwood Books, 1982.

[BEL02] Belcher, T., and Yoram, E. "Riptech Internet Security Threat Report." Riptech, Inc Technical Report , vII, Jul 2002.

[BEL73] Bell, D., and La Padula, L. "Secure Computer Systems: Mathematical Foundations and Model." MITRE Report , MTR 2547 v2, Nov 1973.

[BEL76] Bell, D., and La Padula, L. "Secure Computer Systems: Unified Exposition and Multics Interpretation." U.S. Air Force Electronic Systems Division Technical Report , ESD-TR-75-306, 1976. URL: http://csrc.nist.gov/publications/history/bell76.pdf

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Security in computing»

Look at similar books to Security in computing. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Security in computing»

Discussion, reviews of the book Security in computing and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.