Computer Security: Principles and Practice, Global Edition, 5th edition

Published by Pearson (February 9, 2024) © 2024

  • William Stallings
  • Lawrie Brown

eTextbook

from£28.99

  • Create notes, highlights and flashcards
  • Intuitive search, video, quizzes and interactive features
  • Translate text on-screen into over 100 languages
  • Audiobook for on-the-go learning
  • AI-powered support*
  • 3 months free access to language learning support with Mondly

*Available for some titles

£74.99

  • Hardcover, paperback or looseleaf edition
  • Affordable rental option for select titles

For courses in computer/network security.

Balance principles and standards with current practice

Computer Security incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give students an understanding of the unifying theory and application of important concepts. Hands-on hacking, programming, firewall and lab exercises, real-world case studies and security assessments reinforce understanding of the material.

The 5th Edition is an updated survey of the fast-moving world of computer and network security, with new coverage of important topics.

Hallmark features of this title

  • Hacking exercises help students gain an understanding of issues in intrusion detection and prevention.
  • Laboratory exercises involve programming and experimenting with concepts from the book. Programming projects cover a broad range of topics that can be implemented in any language on any platform.
  • Security education projects cover a range of security topics. Practical security assessment exercises examine current infrastructure and practices of an existing organization.
  • Firewall projects include a portable network firewall visualization simulator with exercises for teaching the fundamentals of firewalls.
  • Real-world case studies include learning objectives, case descriptions and discussion questions.
  • Visit the companion website to view all resources for this title.

New and updated features of this title

  • NEW: Multi-factor authentication (MFA) and mobile authentication discussions in Chapter 3.
  • UPDATED: Lists provide current information on the most dangerous software errors, essential controls, and security controls. New information discusses the recent exploited code injection attack on the Apache Log4j package (Ch. 11); the Australian Signals Directorate's “Essential Eight” (Ch. 12); and NIST security controls (Ch. 15).
  • UPDATED: Mandatory access control (MAC) discussions cover ways in which MACs are now included as part of the underlying security enhancements in recent releases of some Linux, MacOSX and Windows systems (Ch. 4).
  • UPDATED: Social engineering and ransomware attack discussions reflect the growing incidence of such attacks, and the need to defend against them (Chs. 6 and 8). These defenses include improved security awareness training, as discussed in Ch. 17.
  • NEW: Supply-chain and business email compromise (BEC) attacks discussions include the recent SolarWinds attack, which has been used to compromise many commercial and government organizations in recent years.
  • NEW: Section on the ChaCha20 stream cipher replaces the now depreciated RC4 cipher (Ch. 20).
  1. Overview
  2. Cryptographic Tools
  3. User Authentication
  4. Access Control
  5. Database and Data Center Security
  6. Malicious Software
  7. Denial-of-Service Attacs
  8. Intrusion Detection
  9. Firewalls and Intrusion Prevention Systems
  10. Buffer Overflow
  11. Software Security
  12. Operating Systems Security
  13. Cloud and IoT Security
  14. IT Security Management and Risk Assessment
  15. IT Security Controls, plans, and Procedures
  16. Physical and Infrastructure Security
  17. Human Resources Security
  18. Security Auiditing
  19. Legal and Ethical Aspects
  20. Symmetric Encryption and Message Confidentiality
  21. Public-Key Cryptography and Message Authentication
  22. Internet Security Protocols and Standards
  23. Internet Authentication Applications
  24. Wireless Network Security

APPENDICES

  1. Projects and Other Student Exercises for Teaching Computer Security
  2. Some Aspects of Number Theory
  3. Standards and Standard-Setting Organizations
  4. Random and Pseudorandom Number Generation
  5. Message Authentication Codes Based on Block Ciphers
  6. The TCP/IP Protocol Architecture
  7. Radix-64 Conversion
  8. The Domain Name System
  9. The Base Rate Fallacy
  10. SHA-3 814
  11. Glossary

Dr. William Stallings has authored 19 titles and, counting revised editions, more than 40 books on computer security, computer networking and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.

In over 30 years in the field, he has been a technical contributor, technical manager and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection and use of networking software and products.

He created and maintains the Computer Science Student Resource Site. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.

Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering.

Need help? Get in touch

Pearson eText

Extend learning beyond the classroom. Pearson eText is an easy-to-use digital textbook. It lets students customise how they study and learn with enhanced search and the ability to create flashcards, highlight and add notes all in one place. The mobile app lets students learn wherever life takes them, offline or online.

Video
Play
Privacy and cookies
By watching, you agree Pearson can share your viewership data for marketing and analytics for one year, revocable by deleting your cookies.

Pearson eTextbook: What’s on the inside just might surprise you

They say you can’t judge a book by its cover. It’s the same with your students. Meet each one right where they are with an engaging, interactive, personalized learning experience that goes beyond the textbook to fit any schedule, any budget, and any lifestyle.