Computer Security Principles and Practice 4th Edition Stallings Test Bank

$26.99$50.00 (-46%)

In stock

Computer Security Principles and Practice 4th Edition Stallings Test Bank.

Download sample

This is completed downloadable of Computer Security Principles and Practice 4th Edition Stallings Test Bank

Product Details:

Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate–and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject.

 

Table of Content:

  • Chapter 1 Overview

PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES

  • Chapter 2 Cryptographic Tools
  • Chapter 3 User Authentication
  • Chapter 4 Access Control
  • Chapter 5 Database and Data Center Security
  • Chapter 6 Malicious Software
  • Chapter 7 Denial-of-Service Attacks
  • Chapter 8 Intrusion Detection
  • Chapter 9 Firewalls and Intrusion Prevention Systems

PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS

  • Chapter 10 Buffer Overflow
  • Chapter 11 Software Security
  • Chapter 12 Operating System Security
  • Chapter 13 Cloud and IoT Security

PART THREE MANAGEMENT ISSUES

  • Chapter 14 IT Security Management and Risk Assessment
  • Chapter 15 IT Security Controls, Plans and Procedures
  • Chapter 16 Physical and Infrastructure Security
  • Chapter 17 Human Resources Security
  • Chapter 18 Security Auditing
  • Chapter 19 Legal and Ethical Aspects

PART FOUR CRYPTOGRAPHIC ALGORITHMS

  • Chapter 20 Symmetric Encryption and Message Confidentiality
  • Chapter 21 Public-Key Cryptography and Message Authentication

PART FIVE NETWORK SECURITY

  • Chapter 22 Internet Security Protocols and Standards
  • Chapter 23 Internet Authentication Applications
  • Chapter 24 Wireless Network Security

APPENDICES

ACRONYMS

LIST OF NIST DOCUMENTS

REFERENCES

INDEX

ONLINE CHAPTERS AND APPENDICES

Chapter 25 Linux Security

  • Chapter 26 Windows and Windows Vista Security

Appendix B Some Aspects of Number Theory

Appendix C Standards and Standard-Setting Organizations

Appendix D Random and Pseudorandom Number Generation

Appendix E Message Authentication Codes Based on Block Ciphers

Appendix F TCP/IP Protocol Architecture

Appendix G Radix-64 Conversion

Appendix H The Domain Name System

Appendix I The Base-Rate Fallacy

Appendix J SHA-3

Appendix K Glossary

 

People Also Search:

exploring microsoft office 2013 volume 2 poatsy

exploring microsoft office 2013 volume 2 1st edition download scribd

exploring microsoft office 2013 volume 2

exploring microsoft office 2013 volume 2 1st edition testbank download pdf

exploring microsoft office 2013 volume 2 1st edition poatsy

exploring microsoft office 2013 volume 2 1st edition

poatsy exploring microsoft office 2013 volume 2

Instant download after Payment is complete

Main Menu