Computer Security: Principles and Practice, Global Edition, 5th edition
Published by Pearson (February 9, 2024) © 2024
- William Stallings
- Lawrie Brown
eTextbook
- Create notes, highlights and flashcards
- Intuitive search, video, quizzes and interactive features
- Translate text on-screen into over 100 languages
- Audiobook for on-the-go learning
- AI-powered support*
- 3 months free access to language learning support with Mondly
*Available for some titles
- Hardcover, paperback or looseleaf edition
- Affordable rental option for select titles
For courses in computer/network security.
Balance principles and standards with current practice
Computer Security incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give students an understanding of the unifying theory and application of important concepts. Hands-on hacking, programming, firewall and lab exercises, real-world case studies and security assessments reinforce understanding of the material.
The 5th Edition is an updated survey of the fast-moving world of computer and network security, with new coverage of important topics.
Hallmark features of this title
- Hacking exercises help students gain an understanding of issues in intrusion detection and prevention.
- Laboratory exercises involve programming and experimenting with concepts from the book. Programming projects cover a broad range of topics that can be implemented in any language on any platform.
- Security education projects cover a range of security topics. Practical security assessment exercises examine current infrastructure and practices of an existing organization.
- Firewall projects include a portable network firewall visualization simulator with exercises for teaching the fundamentals of firewalls.
- Real-world case studies include learning objectives, case descriptions and discussion questions.
- Visit the companion website to view all resources for this title.
New and updated features of this title
- NEW: Multi-factor authentication (MFA) and mobile authentication discussions in Chapter 3.
- UPDATED: Lists provide current information on the most dangerous software errors, essential controls, and security controls. New information discusses the recent exploited code injection attack on the Apache Log4j package (Ch. 11); the Australian Signals Directorate's “Essential Eight” (Ch. 12); and NIST security controls (Ch. 15).
- UPDATED: Mandatory access control (MAC) discussions cover ways in which MACs are now included as part of the underlying security enhancements in recent releases of some Linux, MacOSX and Windows systems (Ch. 4).
- UPDATED: Social engineering and ransomware attack discussions reflect the growing incidence of such attacks, and the need to defend against them (Chs. 6 and 8). These defenses include improved security awareness training, as discussed in Ch. 17.
- NEW: Supply-chain and business email compromise (BEC) attacks discussions include the recent SolarWinds attack, which has been used to compromise many commercial and government organizations in recent years.
- NEW: Section on the ChaCha20 stream cipher replaces the now depreciated RC4 cipher (Ch. 20).
- Overview
- Cryptographic Tools
- User Authentication
- Access Control
- Database and Data Center Security
- Malicious Software
- Denial-of-Service Attacs
- Intrusion Detection
- Firewalls and Intrusion Prevention Systems
- Buffer Overflow
- Software Security
- Operating Systems Security
- Cloud and IoT Security
- IT Security Management and Risk Assessment
- IT Security Controls, plans, and Procedures
- Physical and Infrastructure Security
- Human Resources Security
- Security Auiditing
- Legal and Ethical Aspects
- Symmetric Encryption and Message Confidentiality
- Public-Key Cryptography and Message Authentication
- Internet Security Protocols and Standards
- Internet Authentication Applications
- Wireless Network Security
APPENDICES
- Projects and Other Student Exercises for Teaching Computer Security
- Some Aspects of Number Theory
- Standards and Standard-Setting Organizations
- Random and Pseudorandom Number Generation
- Message Authentication Codes Based on Block Ciphers
- The TCP/IP Protocol Architecture
- Radix-64 Conversion
- The Domain Name System
- The Base Rate Fallacy
- SHA-3 814
- Glossary
Dr. William Stallings has authored 19 titles and, counting revised editions, more than 40 books on computer security, computer networking and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association.
In over 30 years in the field, he has been a technical contributor, technical manager and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection and use of networking software and products.
He created and maintains the Computer Science Student Resource Site. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology.
Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering.
Need help? Get in touch