Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Introduction to computer security
Bookmark Share

Text

Introduction to computer security

Goodrich, Michael T. - Personal Name; Tamassia, Roberto - Personal Name;

Contents

Chapter 1. Introduction
1.1. Fundamental Concepts
1.2. Cryptographic Concepts
1.3. Access Control Models
1.4. Implementation and Usability Issues
1.5. Exercises

Chapter 2. Cryptography
2.1. Symmetric Cryptography
2.2. Public-Key Cryptography
2.3. Cryptographic Hash Functions
2.4. Digital Signatures
2.5. Details of AES and RSA Cryptography
2.6. Exercises

Chapter 3. Operating Systems Security
3.1. Operating Systems Concepts
3.2. Process Security
3.3. Memory and Filesystem Security
3.4. Application Program Security
3.5. Exercises

Chapter 4. Malicious Software
4.1. Insider Attacks
4.2. Computer Viruses
4.3. Malware Attacks
4.4. Privacy-Invasive Software
4.5. Countermeasure
4.6. Exercise

Chapter 5. Network Security
5.1. Network Security Concepts
5.2. The Link Layer
5.3. The Network Layer
5.4. The Tansport Layer
5.5. DoS Attacks
5.6. Exercises

Chapter 6. Network Security II
6.1. The Application Layer and DNS
6.2. Firewalls
6.3. Tunneling
6.4. Intrusion Detection
6.5. Wireless Networking
6.6. Exercises

Chapter 7. Browser Security
7.1. The WWW
7.2. Attacks on Clients
7.3. Attacks on Servers
7.4. Exercises

Chapter 8. Physical Security
8.1. Physical Protections and Attacks
8.2. Locks and Safes
8.3. Authentication Technologies
8.4. Direct Attacks Against Computers
8.5. Special-Purpose Machines
8.6. Physical Intrusion Detection
8.7. Exercises

Chapter 9. Security Models and Practice
9.1. Policy, Models, and Trust
9.2. Access-Control Models
9.3. Software Vulnerability Assesment
9.4. Security Standards and Evaluations
9.5. Administration and Auditing
9.6. Kerberos
9.7. Secure Storage
9.8. Exercises

Chapter 10. Application Security
10.1. Database Security
10.2. Email Security
10.3. Payment Systems and Auctions
10.4. Digital-Rights Management
10.5. Exercices


Availability
#
Perpustakaan Poltek SSN 382
000 01192
Available
Detail Information
Series Title
-
Call Number
005 GOO I
Publisher
Massachusetts : Pearson Education., 2011
Collation
xix; 541 hal.; ilus.; 25 cm
Language
English
ISBN/ISSN
9780321702012
Classification
005
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
-
Specific Detail Info
-
Statement of Responsibility
Michael T. Goodrich
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?