Computer Security Principles and Practice, 5th edition

Published by Pearson (July 28, 2023) © 2024

  • William Stallings
  • Lawrie Brown

eTextbook on Pearson+

ISBN-13: 9780138091712 (2023 update)

eTextbook features

  • Instant access to eTextbook
  • Search, highlight, and notes
  • Create flashcards
Products list

Details

  • A print text you can rent
  • Fulfilled by eCampus.com
  • Option to keep after rental expires

Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material. Hacking and lab exercises, real-world case studies, and security assessments further your understanding of text concepts.

  1. Overview
  2. Cryptographic Tools
  3. User Authentication
  4. Access Control
  5. Database and Data Center Security
  6. Malicious Software
  7. Denial-of-Service Attacs
  8. Intrusion Detection
  9. Firewalls and Intrusion Prevention Systems
  10. Buffer Overflow
  11. Software Security
  12. Operating Systems Security
  13. Cloud and IoT Security
  14. IT Security Management and Risk Assessment
  15. IT Security Controls, plans, and Procedures
  16. Physical and Infrastructure Security
  17. Human Resources Security
  18. Security Auiditing
  19. Legal and Ethical Aspects
  20. Symmetric Encryption and Message Confidentiality
  21. Public-Key Cryptography and Message Authentication
  22. Internet Security Protocols and Standards
  23. Internet Authentication Applications
  24. Wireless Network Security

APPENDICES

  1. Projects and Other Student Exercises for Teaching Computer Security
  2. Some Aspects of Number Theory
  3. Standards and Standard-Setting Organizations
  4. Random and Pseudorandom Number Generation
  5. Message Authentication Codes Based on Block Ciphers
  6. The TCP/IP Protocol Architecture
  7. Radix-64 Conversion
  8. The Domain Name System
  9. The Base Rate Fallacy
  10. SHA-3 814
  11. Glossary

Need help? Get in touch