Computer Security: Principles and Practice Hardcover – Aug 2 2007
There is a newer edition of this item:
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
From the Back Cover
<>Computer Security: Principles and Practice
William Stallings and Lawrie Brown
A thorough, up-to-date survey of the entire discipline of computer security.
Security experts William Stallings and Lawrie Brown provide a comprehensive survey of computer security threats, technical approaches to the detection and prevention of security attacks, software security issues, and management issues.
Throughout, the authors focus on core principles, showing how they unify the field of computer securuity and demonstrating their applications in real-world systems and networks. They examine alternate design approaches to meeting security requirements and illuminate the standards that are central to today's security solutions.
Ideal for both academic and professional audiences, Computer Security offers exceptional clarity, careful organization, and extensive pedagogical support - including hundreds of carefully crafted practice problems.
- Security technologies and principles, including cryptography, authentication, and access control
- Threats and countermeasures, from detecting intruders to countering DOS attacks
- Trusted computing and multilevel security
- Secure software: avoiding buffer overflows, malicious input, and other weaknesses
- Linux and Windows security models
- Managing security: physical security, training, audits, policies, and more
- Computer crime, intellectual property, privacy, and ethics
- Cryptographic algorithms, including public-key cryptography
- Internet security: SSL, TLS, IP security, S/MIME, Kerberos, X.509, and federatetd identity management
- Strong coverage of unifying principles and design techniques
- Dozens of figures and tables that clarify key concepts
- Field-tested homework problems
- Extensive Web support at WilliamStallings.com/CompSec/CompSec1e.html
- Keyword/acronym lists, recommended readings, and glossary
About the Authors
William Stallings has won the Best Computer Science and Engineering Textbook award seven times. His Prentice Hall books include Operating Systems ; Cryptography and Network Security; and Data and Computer Communications . Stallings consults widely with technology providers, customers, and researchers. He holds a Ph.D. in Computer Science from MIT. Dr. Lawrie Brown is Senior Lecturer at the School of Information Technology and Electrical Engineering at the University of New South Wales at the Australian Defence Force Academy, Canberra, Australia.
Comprehensive Web support at WilliamStallings.com
About the Author
<>William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 17 titles, and counting revised editions, a total of 41 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. He is a frequent lecturer and author of numerous technical papers. His books include Data and Computer Communications, Eighth Edition (Prentice Hall, 2007), which has become the standard in the field. Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
Most Helpful Customer Reviews on Amazon.com (beta)
Chapter 1 Overview
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
Chapter 3 User Authentication
Chapter 4 Access Control
Chapter 5 Database Security
Chapter 6 Intrusion Detection
Appendix 6A:The Base-Rate Fallacy
Chapter 7 Malicious Software
Chapter 8 Denial of Service
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 10 Trusted Computing and Multilevel Security
PART TWO SOFTWARE SECURITY
Chapter 11 Buffer Overflow
Chapter 12 Other Software Security Issues
PART THREE MANAGEMENT ISSUES
Chapter 13 Physical and Infrastructure Security
Chapter 14 Human Factors
Appendix 14A: Security Awareness Standard of Good Practice
Appendix 14B: Security Policy Standard of Good Practice
Chapter 15 Security Auditing
Chapter 16 IT Security Management and Risk Assessment
Chapter 17 IT Security Controls, Plans and Procedures
Chapter 18 Legal and Ethical Aspects
Appendix 18A: Information Privacy Standard of Good Practice
PART FOUR CRYPTOGRAPHIC ALGORITHMS
Chapter 19 Symmetric Encryption and Message Confidentiality
Chapter 20 Public-Key Cryptography and Message Authentication
PART FIVE INTERNET SECURITY
Chapter 21 Internet Security Protocols and Standards
Chapter 22 Internet Authentication Applications
PART SIX OPERATING SYSTEM SECURITY
Chapter 23 Linux Security
Chapter 24 Windows Security
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
A.3 Fermat's and Euler's Theorems
Appendix B Random and Pseudorandom Number Generation
B.1 The Use of Random Numbers
B.2 Pseudorandom Number Generators (PRNGs)
B.3 True Random Number Generators
Appendix C Projects for Teaching Computer Security
C.1 Research Projects
C.2 Programming Projects
C.3 Laboratory Exercises
C.4 Writing Assignments
C.5 Reading/Report Assignments
Appendix D Standards and Standard-Setting Organizations
Appendix E TCP/IP Protocol Architecture
Appendix F Glossary
Also, most modern books include either a self-testing CD or a web site where you can quiz yourself. If you're using this book for self-study (as opposed to being in a class), it's difficult to gauge how well you're retaining the information. This book does not include a CD. It does, however have a companion web site but I was unable to find a self-assessment tool on that website.
Like the other books of Stallings that I've read, it suffers somewhat from what I'll call "standards-itis." It uses well-known and well-documented methods and protocols as the only means of explaining some concepts. It thus may take a concept like "passwords" and say here is how UNIX does it, here is how that's been improved, and here are some published ideas on stopping bad password use. That's not bad, though it could be centered more around the principles of password protection. What's worse is when the book goes into great detail about things like the options in a Snort rule. This can make for some unnecessarily boring stretches of reading, with little conceptual material being imparted.
As another reviewer pointed out, you can't just pick up the book and have a ready-made course. You should supplement with some online materials (probably necessary anyway) and prepare students specifically for any labs you do. And I don't recommend this for someone learning without a teacher.
Overall, however, I think it's the best intro text for the subject that I've found.
Anyway, back to Stallings and Brown. It does proffer good technical explanations of various malware. Like worms and viruses. And attack modes like Denial of Service, and Distributed Denial of Service. Important variants are also covered - reflector and amplifier attacks.
Countermeasures to malware then naturally enter the narrative. So you learn how a firewall functions. Plus how to set up a honeypot to attract spam, phishing and malware.
So far, the above might be regarded as external attacks on your system. Sometimes, worms or viruses might try to take advantage of weaknesses in installed programs. Hence, another section of the book is for those of you who write such programs. Explaining how to guard against buffer and stack overflows, for example. These 2 are perhaps the most common entry points for malware.
I thought it would be great and have a lot of hands on projects etc.
There is a lot of good information here, but it falls short in the hands on.
Also, it has a ton of very dry math.
Do not get it unless it is required for school.
Look for similar items by category
- Books > Business & Investing > Industries & Professions > E-commerce
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > History & Culture > Privacy
- Books > Computers & Technology > Internet & Social Media
- Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Security & Encryption
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Textbooks > Computer Science & Information Systems