Text
Introduction to computer security
Contents
Chapter 1. Introduction
1.1. Fundamental Concepts
1.2. Cryptographic Concepts
1.3. Access Control Models
1.4. Implementation and Usability Issues
1.5. Exercises
Chapter 2. Cryptography
2.1. Symmetric Cryptography
2.2. Public-Key Cryptography
2.3. Cryptographic Hash Functions
2.4. Digital Signatures
2.5. Details of AES and RSA Cryptography
2.6. Exercises
Chapter 3. Operating Systems Security
3.1. Operating Systems Concepts
3.2. Process Security
3.3. Memory and Filesystem Security
3.4. Application Program Security
3.5. Exercises
Chapter 4. Malicious Software
4.1. Insider Attacks
4.2. Computer Viruses
4.3. Malware Attacks
4.4. Privacy-Invasive Software
4.5. Countermeasure
4.6. Exercise
Chapter 5. Network Security
5.1. Network Security Concepts
5.2. The Link Layer
5.3. The Network Layer
5.4. The Tansport Layer
5.5. DoS Attacks
5.6. Exercises
Chapter 6. Network Security II
6.1. The Application Layer and DNS
6.2. Firewalls
6.3. Tunneling
6.4. Intrusion Detection
6.5. Wireless Networking
6.6. Exercises
Chapter 7. Browser Security
7.1. The WWW
7.2. Attacks on Clients
7.3. Attacks on Servers
7.4. Exercises
Chapter 8. Physical Security
8.1. Physical Protections and Attacks
8.2. Locks and Safes
8.3. Authentication Technologies
8.4. Direct Attacks Against Computers
8.5. Special-Purpose Machines
8.6. Physical Intrusion Detection
8.7. Exercises
Chapter 9. Security Models and Practice
9.1. Policy, Models, and Trust
9.2. Access-Control Models
9.3. Software Vulnerability Assesment
9.4. Security Standards and Evaluations
9.5. Administration and Auditing
9.6. Kerberos
9.7. Secure Storage
9.8. Exercises
Chapter 10. Application Security
10.1. Database Security
10.2. Email Security
10.3. Payment Systems and Auctions
10.4. Digital-Rights Management
10.5. Exercices
No other version available