Switch content of the page by the Role togglethe content would be changed according to the role
Computer Security Principles and Practice, 5th edition
Published by Pearson (May 31, 2023) © 2024
- William Stallings
- Lawrie Brown
eTextbook
/moper month
- Anytime, anywhere learning with the Pearson+ app
- Easy-to-use search, navigation and notebook
- Simpler studying with flashcards
$79.99
- Hardcover, paperback or looseleaf edition
- Affordable rental option for select titles
For courses in computer/network security.
Balance principles and standards with current practice
Computer Security incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give students an understanding of the unifying theory and application of important concepts. Hands-on hacking, programming, firewall and lab exercises, real-world case studies and security assessments reinforce understanding of the material.
The 5th Edition is an updated survey of the fast-moving world of computer and network security, with new coverage of important topics.
Hallmark features of this title
- Hacking exercises help students gain an understanding of issues in intrusion detection and prevention.
- Laboratory exercises involve programming and experimenting with concepts from the book. Programming projects cover a broad range of topics that can be implemented in any language on any platform.
- Security education projects cover a range of security topics. Practical security assessment exercises examine current infrastructure and practices of an existing organization.
- Firewall projects include a portable network firewall visualization simulator with exercises for teaching the fundamentals of firewalls.
- Real-world case studies include learning objectives, case descriptions and discussion questions.
- Visit the companion website at www.pearsonhighered.com/stallings to view all resources for this title.
New and updated features of this title
- NEW: Multi-factor authentication (MFA) and mobile authentication discussions in Chapter 3.
- UPDATED: Lists provide current information on the most dangerous software errors, essential controls, and security controls. New information discusses the recent exploited code injection attack on the Apache Log4j package (Ch. 11); the Australian Signals Directorate's “Essential Eight” (Ch. 12); and NIST security controls (Ch. 15).
- UPDATED: Mandatory access control (MAC) discussions cover ways in which MACs are now included as part of the underlying security enhancements in recent releases of some Linux, MacOSX and Windows systems (Ch. 4).
- UPDATED: Social engineering and ransomware attack discussions reflect the growing incidence of such attacks, and the need to defend against them (Chs. 6 and 8). These defenses include improved security awareness training, as discussed in Ch. 17.
- NEW: Supply-chain and business email compromise (BEC) attacks discussions include the recent SolarWinds attack, which has been used to compromise many commercial and government organizations in recent years.
- NEW: Section on the ChaCha20 stream cipher replaces the now depreciated RC4 cipher (Ch. 20).
- Overview
- Cryptographic Tools
- User Authentication
- Access Control
- Database and Data Center Security
- Malicious Software
- Denial-of-Service Attacs
- Intrusion Detection
- Firewalls and Intrusion Prevention Systems
- Buffer Overflow
- Software Security
- Operating Systems Security
- Cloud and IoT Security
- IT Security Management and Risk Assessment
- IT Security Controls, plans, and Procedures
- Physical and Infrastructure Security
- Human Resources Security
- Security Auiditing
- Legal and Ethical Aspects
- Symmetric Encryption and Message Confidentiality
- Public-Key Cryptography and Message Authentication
- Internet Security Protocols and Standards
- Internet Authentication Applications
- Wireless Network Security
APPENDICES
- Projects and Other Student Exercises for Teaching Computer Security
- Some Aspects of Number Theory
- Standards and Standard-Setting Organizations
- Random and Pseudorandom Number Generation
- Message Authentication Codes Based on Block Ciphers
- The TCP/IP Protocol Architecture
- Radix-64 Conversion
- The Domain Name System
- The Base Rate Fallacy
- SHA-3 814
- Glossary
Need help? Get in touch
Play
Privacy and cookies
By watching, you agree Pearson can share your viewership data for marketing and analytics for one year, revocable upon changing cookie preferences. Disabling cookies may affect video functionality. More info...