1 / 1000
文档名称:

Prentice.Hall.Security.puting.4th.Edition.Oct.2006.pdf

格式:pdf   页数:1,000
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Prentice.Hall.Security.puting.4th.Edition.Oct.2006.pdf

上传人:kuo08091 2014/5/14 文件大小:0 KB

下载得到文件列表

Prentice.Hall.Security.puting.4th.Edition.Oct.2006.pdf

文档介绍

文档介绍:Security puting, Fourth Edition
By Charles P. Pfleeger - Pfleeger Consulting Group, Shari Lawrence Pfleeger - RAND Corporation
...............................................
Publisher: Prentice Hall
Pub Date: October 13, 2006
Print ISBN-10: 0-13-239077-9
Print ISBN-13: 978-0-13-239077-4
Pages: 880

Table of Contents | Index
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber
Security and the Intersection of Privacy and Information Security
For years, IT and security professionals and students have turned to Security puting as the
definitive guide to information puter security attacks and countermeasures. In their new
fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic
guide to reflect today's newest technologies, standards, and trends.
The authors first introduce the core concepts and vocabulary puter security, including attacks
and controls. Next, the authors systematically identify and assess threats now facing programs,
operating systems, database systems, works. For each threat, they offer best-practice
responses.
Security puting, Fourth Edition, goes beyond technology, covering crucial management
issues faced in protecting infrastructure and information. This edition contains an all-new chapter on
the economics of cybersecurity, explaining ways to make a business case for security investments.
Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.
New coverage also includes
Programming mistakes promise security: man-in-the-middle, timing, and privilege
escalation attacks
Web application threats and vulnerabilities
Networks promised systems: bots, s, and drones
Rootkits--including the notorious Sony XCP
Wi-work security challenges, standards, and techniques
New malicious code attacks, including false interfaces and keystroke loggers
Improving code quality: software engineering