Computer Security: Principles and Practice, Global Edition, 5th edition

Published by Pearson (February 9, 2024) © 2024

  • William Stallings
  • Lawrie Brown
Products list

Access details

  • Instant access once purchased
  • 12-month access
  • Offline access via app

Features

  • Security assessment exercises
  • Embedded videos and media
  • Add notes and highlight
  • Full text audio
  • Enhanced keyword search

Aa balanced presentation of both principles and practice

Computer Security, 5th Edition incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material. Hacking and lab exercises, real-world case studies, and security assessments further your understanding of text concepts.

  1. Overview
  2. Cryptographic Tools
  3. User Authentication
  4. Access Control
  5. Database and Data Center Security
  6. Malicious Software
  7. Denial-of-Service Attacks
  8. Intrusion Detection
  9. Firewalls and Intrusion Prevention Systems
  10. Buffer Overflow
  11. Software Security
  12. Operating Systems Security
  13. Cloud and IoT Security
  14. IT Security Management and Risk Assessment
  15. IT Security Controls, plans, and Procedures
  16. Physical and Infrastructure Security
  17. Human Resources Security
  18. Security Auditing
  19. Legal and Ethical Aspects
  20. Symmetric Encryption and Message Confidentiality
  21. Public-Key Cryptography and Message Authentication
  22. Internet Security Protocols and Standards
  23. Internet Authentication Applications
  24. Wireless Network Security

APPENDICES

  1. Projects and Other Student Exercises for Teaching Computer Security
  2. Some Aspects of Number Theory
  3. Standards and Standard-Setting Organizations
  4. Random and Pseudorandom Number Generation
  5. Message Authentication Codes Based on Block Ciphers
  6. The TCP/IP Protocol Architecture
  7. Radix-64 Conversion
  8. The Domain Name System
  9. The Base Rate Fallacy
  10. SHA-3 814
  11. Glossary

Need help? Get in touch