Image from Google Jackets

Computer Security / Dieter Gollmann.

By: Material type: TextTextPublication details: New Delhi. John wiley & sons; 2011.Edition: 3rd. ed. 2011Description: vi-436 p. softbound 18x23cmISBN:
  • 978-81-265-5082-1
DDC classification:
  • 23 005.8 GOL
Contents:
CH AP T ER 1 – History of Computer Security 1 1.1 The Dawn of Computer Security 21.2 1970s – Mainframes 31.3 1980s – Personal Computers 41.3.1 An Early Worm 51.3.2 The Mad Hacker 61.4 1990s – Internet 61.5 2000s – The Web 81.6 Conclusions – The Benefits of Hindsight 101.7 Exercises 11 CH AP T ER 2 – Managing Security 13 2.1 Attacks and Attackers 142.2 Security Management 152.2.1 Security Policies 162.2.2 Measuring Security 172.2.3 Standards 192.3 Risk and Threat Analysis 212.3.1 Assets 222.3.2 Threats 232.3.3 Vulnerabilities 242.3.4 Attacks 242.3.5 Common Vulnerability Scoring System 262.3.6 Quantitative and Qualitative Risk Analysis 262.3.7 Countermeasures – Risk Mitigation 282.4 Further Reading 292.5 Exercises 29 CH AP T ER 3 – Foundations of Computer Security 31 3.1 Definitions 323.1.1 Security 323.1.2 Computer Security 343.1.3 Confidentiality 343.1.4 Integrity 353.1.5 Availability 363.1.6 Accountability 373.1.7 Non-repudiation 38 CH A PT ER 4 – Identification and Authentication 49 4.1 Username and Password 504.2 Bootstrapping Password Protection 514.3 Guessing Passwords 524.4 Phishing, Spoofing, and Social Engineering 544.4.1 Password Caching 554.5 Protecting the Password File 564.6 Single Sign-on 584.7 Alternative Approaches 594.8 Further Reading 634.9 Exercises 63 CH A PT ER 5 – Access Control 65 5.1 Background 665.2 Authentication and Authorization 665.3 Access Operations 685.3.1 Access Modes 685.3.2 Access Rights of the Bell–LaPadula Model 685.3.3 Administrative Access Rights 705.4 Access Control Structures 715.4.1 Access Control Matrix 715.4.2 Capabilities 725.4.3 Access Control Lists 725.5 Ownership 735.6 Intermediate Controls 745.6.1 Groups and Negative Permissions 745.6.2 Privileges 755.6.3 Role-Based Access Control 765.6.4 Protection Ring CH AP T ER 6 – Reference Monitors CH AP T ER 7 – Unix Security CH A PT ER 8 – Windows Security CH AP T ER 9 – Database Security CH AP T ER 10 – Software Security CH A PTER 11 – Bell–LaPadula Model CH A PT ER 12 – Security Models CH AP T ER 13 – Security Evaluation CH AP T ER 14 – Cryptography CH A PT ER 15 – Key Establishment CH A PT ER 16 – Communications Security CH AP T ER 17 – Network Security CH AP T ER 18 – Web Security CH A PT ER 19 – Mobility CH A PT ER 20 – New Access Control Paradigms
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books Tetso College Library Computer Science Non-fiction 005.8 GOL (Browse shelf(Opens below)) Available 10632
Books Books Tetso College Library Computer Science Non-fiction 005.8 GOL (Browse shelf(Opens below)) Available 10549

CH AP T ER 1 – History of Computer Security 1
1.1 The Dawn of Computer Security 21.2 1970s – Mainframes 31.3 1980s – Personal Computers 41.3.1 An Early Worm 51.3.2 The Mad Hacker 61.4 1990s – Internet 61.5 2000s – The Web 81.6 Conclusions – The Benefits of Hindsight 101.7 Exercises 11
CH AP T ER 2 – Managing Security 13
2.1 Attacks and Attackers 142.2 Security Management 152.2.1 Security Policies 162.2.2 Measuring Security 172.2.3 Standards 192.3 Risk and Threat Analysis 212.3.1 Assets 222.3.2 Threats 232.3.3 Vulnerabilities 242.3.4 Attacks 242.3.5 Common Vulnerability Scoring System 262.3.6 Quantitative and Qualitative Risk Analysis 262.3.7 Countermeasures – Risk Mitigation 282.4 Further Reading 292.5 Exercises 29
CH AP T ER 3 – Foundations of Computer Security 31
3.1 Definitions 323.1.1 Security 323.1.2 Computer Security 343.1.3 Confidentiality 343.1.4 Integrity 353.1.5 Availability 363.1.6 Accountability 373.1.7 Non-repudiation 38
CH A PT ER 4 – Identification and Authentication 49
4.1 Username and Password 504.2 Bootstrapping Password Protection 514.3 Guessing Passwords 524.4 Phishing, Spoofing, and Social Engineering 544.4.1 Password Caching 554.5 Protecting the Password File 564.6 Single Sign-on 584.7 Alternative Approaches 594.8 Further Reading 634.9 Exercises 63
CH A PT ER 5 – Access Control 65
5.1 Background 665.2 Authentication and Authorization 665.3 Access Operations 685.3.1 Access Modes 685.3.2 Access Rights of the Bell–LaPadula Model 685.3.3 Administrative Access Rights 705.4 Access Control Structures 715.4.1 Access Control Matrix 715.4.2 Capabilities 725.4.3 Access Control Lists 725.5 Ownership 735.6 Intermediate Controls 745.6.1 Groups and Negative Permissions 745.6.2 Privileges 755.6.3 Role-Based Access Control 765.6.4 Protection Ring
CH AP T ER 6 – Reference Monitors
CH AP T ER 7 – Unix Security
CH A PT ER 8 – Windows Security
CH AP T ER 9 – Database Security
CH AP T ER 10 – Software Security
CH A PTER 11 – Bell–LaPadula Model
CH A PT ER 12 – Security Models
CH AP T ER 13 – Security Evaluation
CH AP T ER 14 – Cryptography
CH A PT ER 15 – Key Establishment
CH A PT ER 16 – Communications Security
CH AP T ER 17 – Network Security
CH AP T ER 18 – Web Security
CH A PT ER 19 – Mobility
CH A PT ER 20 – New Access Control Paradigms

There are no comments on this title.

to post a comment.

Copyright(C) 2015, All rights reserved by Tetso College