Try for free

Introduction to Computer Security

Michael Goodrich, Roberto Tamassia

Information

  • Publisher
  • ISBN
  • ePub ISBN
  • Pearson UK
  • 9781292037912
  • 9781292025407
  • Published at
  • Pressing
  • 2013
  • 1

About this book

Accessible to the general-knowledge reader. Authors Goodrich and Tamassia recognize that prerequisites for an extensive background in CS and mathematics are not only unnecessary for learning but also arguably contribute to a reduction in enrollments and a shortage of computer-security experts. Therefore, the authors assume only the most basic of prerequisite knowledge in computing, making this text suitable for beginning computer science majors, as well as computer science minors and non-majors. Teaches general principles of computer security from an applied viewpoint. In this new text, the authors cover specific computer security topics while providing necessary material on the foundations of computing needed to understand these topics. As a result, students learn about vital computer security topics such as access control, firewalls, and viruses as well as a variety of fundamental computer-science concepts like algorithms, operating systems, networking, and programming languages. Topics covered include: o Common cyberattacks including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. o Techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. o Fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols. o Human and social aspects of computer security, including usability, interfaces, copyright, digital rights management, social engineering, and ethical issues. A practical introduction that will prepare students for careers in a variety of fields. This text encourages students to think about security issues and to deploy security mechanisms early in designing software applications or in making software purchase/ deployment decisions. This skill will be appreciated by future employers--who may include corporations in the financial, healthcare and technology sectors--for whom the security of software applications is a critical requirement. The material in the text will also provide readers with a clear understanding of the security ramifications of using computers and the Internet in their daily lives (e.g., for online banking and shopping), as well as the potential threats to individual privacy (as seen in recent debates on electronic voting, for example), and possibly to democracy itself, that may arise from inappropriate use of computer security technology. Projects The authors provide a collection of creative, hands-on projects at three levels of difficulty that can be used both in computer security and computer security-related courses. A wide set of options will allow instructors to customize the projects to suit a variety of learning modes and lab resources. In each project, students are given a realistic, though simplified, version of a working system with multiple vulnerabilities and a list of allowed attack vectors. They may be asked to work in “break-it” mode, which will require students to attack a system by developing exploits that take advantage of the discovered vulnerabilities, or they may be asked to work in “fix-it” mode in which the student hardens the system by developing mechanisms for removing or mitigating the vulnerabilities. SUPPLEMENTS A collection of slide presentations created by the authors each suitable for a one-hour lecture, covering all the course topics. The presentations will include links to relevant resources on the web and will have extensive notes. The slide presentations have been created in

Note: Some books are only available in specific countries.

Therefore, always check if your books are available in your country before subscribing by using the search function in the app at buku.app.