Free
Security In Computing, 4th Edition
Ebooks Online

The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including attacks and controls. Next, the authors systematically identify and assess threats now facing programs, operating systems, database systems, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition , goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using the Advanced Encryption System (AES) more effectively Balancing dissemination with piracy control in music and other digital content Countering new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit

Hardcover: 880 pages

Publisher: Prentice Hall; 4th edition (October 23, 2006)

Language: English

ISBN-10: 0132390779

ISBN-13: 978-0132390774

Product Dimensions: 7.4 x 1.9 x 9.5 inches

Shipping Weight: 3.4 pounds (View shipping rates and policies)

Average Customer Review: 4.0 out of 5 stars  See all reviews (58 customer reviews)

Best Sellers Rank: #349,586 in Books (See Top 100 in Books) #79 in Books > Computers & Technology > Certification > CompTIA #319 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #450 in Books > Textbooks > Computer Science > Networking

[A review of the 4th Edition, that was published in October 2006.]I would compare this book to Matt Bishop's "Introduction to Computer Security". The latter is far more mathematical. Probably too much so for the typical sysadmin who is looking to defend her computers and network. Bishop's book is perhaps best suited to someone who wants to deeply understand cryptosystems and malware, and who might want to design a new cryptosystem or a malware detector. Whereas the Pfleeger book does not stress mathematical formalism at all. Much easier for a broader IT audience to understand. For a sysadmin, programmer, or an IT manager. All you need is some general background in computing, and much of the book will be very intelligible.For cryptography, there are 2 chapters, that give a quick overview of symmetric and public key systems. At the schematic level, with few equations. The seminal RSA algorithm is explained. The second cryptography chapter is actually the book's last chapter. Appropriate, because it is the most mathematical section of the text. It includes a nice Figure 12-3, that is an especially clear schematic of the hierarchies of complexity classes. It should make apparent the distinction between NP and P(olynomial) complete problems.There is a wide survey of malware. For viruses, there are qualitative explanations of how viruses can infect code. The level of detail is not that of more specialised books that focus just on viruses. The text does not give you enough to detect or write a virus. But you can understand how they work, at a level adequate for a sysadmin, say.

Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Security in Computing, 4th Edition Introduction to Evolutionary Computing (Natural Computing Series) CUDA Programming: A Developer's Guide to Parallel Computing with GPUs (Applications of Gpu Computing) Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983-1993 (History of Computing) Dependable Computing for Critical Applications 5 (Dependable Computing and Fault-Tolerant Systems) Wireless Computing in Medicine: From Nano to Cloud with Ethical and Legal Implications (Nature-Inspired Computing Series) CORBA Security: An Introduction to Safe Computing with Objects (The Addison-Wesley Object Technology Series) Thinking Security: Stopping Next Year's Hackers (Addison-Wesley Professional Computing Series) Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More Differential Equations Computing and Modeling (4th Edition) Security Analysis: Sixth Edition, Foreword by Warren Buffett (Security Analysis Prior Editions) Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust) Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption Programmer's Ultimate Security DeskRef: Your programming security encyclopedia Security Risk Management: Building an Information Security Risk Management Program from the Ground Up 6 Months to 6 Figure Passive Income: Anyone Can Do It - Guide to Guaranteed Financial Security .. Make Money While You Sleep (Personal Financial Security) Security Risk Assessment: Managing Physical and Operational Security