COMPUTER SECURITY:PRINCIPLES AND PRACTICE 4/E (GE)

COMPUTER SECURITY:PRINCIPLES AND PRACTICE 4/E (GE) pdf epub mobi txt 电子书 下载 2025

图书标签:
  • 计算机安全
  • 信息安全
  • 网络安全
  • 密码学
  • 操作系统安全
  • 恶意软件
  • 漏洞分析
  • 安全实践
  • 第四版
  • GE
想要找书就要到 小特书站
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

具体描述

For courses in computer/network security

  Balancing principle and practice—an updated survey of the fast-moving world of computer and network security

  Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate—and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject.

  The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the ‘gold standard’ when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.

本书特色

  Content updates

  .Data center security discussion in Chapter 5 covers data center security and the TIA-492 specification of reliability tiers.
  .Malware material in Chapter 6 includes additional material on macro viruses and their structure, as they are now the most common form of virus malware.
  .Virtualization securitymaterial in Chapter 12 has been extended, given the rising use of such systems by organizations and in cloud computing environments. A discussion of virtual firewalls, which may be used to help secure these environments, has also been added.
  .Cloud security discussion inChapter 13 includes an introduction to cloud computing, key cloud security concepts, an analysis of approaches to cloud security, and an open-source example.
  .IoT security indiscussion Chapter 13 covers security for the Internet of Things (IoT). The discussion includes an introduction to IoT, an overview of IoT security issues, and an open-source example.
  .SEIMdiscussion in Chapter 18 is updated for Security Information and Event Management (SIEM) Systems.
  .Privacy section covers privacy issues and its management in Chapter 19. The section has been extended with additional discussion of moral and legal approaches, and the privacy issues related to big data.
  .Authenticated encryption has become an increasingly widespread cryptographic tool in a variety of applications and protocols. Chapter 21 includes a new discussion of authenticated description and describes an important authenticated encryption algorithm known as offset codebook (OCB) mode.
 

著者信息

图书目录

Ch1: Overview

PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Ch2: Cryptographic Tools
Ch3: User Authentication
Ch4: Access Control
Ch5: Database and Data Center Security
Ch6: Malicious Software
Ch7: Denial-of-Service Attacks
Ch8: Intrusion Detection
Ch9: Firewalls and Intrusion Prevention Systems

PART TWO SOFTWARE SECURITY AND TRUSTED SYSTEMS
Ch10: Buffer Overflow
Ch11: Software Security
Ch12: Operating System Security
Ch13: Cloud and IoT Security

PART THREE MANAGEMENT ISSUES
Ch14: IT Security Management and Risk Assessment
Ch15: IT Security Controls, Plans and Procedures
Ch16: Physical and Infrastructure Security
Ch17: Human Resources Security
Ch18: Security Auditing
Ch19: Legal and Ethical Aspects

PART FOUR CRYPTOGRAPHIC ALGORITHMS
Ch20: Symmetric Encryption and Message Confidentiality
Ch21: Public-Key Cryptography and Message Authentication

PART FIVE NETWORK SECURITY
Ch22: Internet Security Protocols and Standards
Ch23: Internet Authentication Applications
Ch24: Wireless Network Security

APPENDICES
Appendix A Projects and Other Student Exercises for Teaching Computer Security
ACRONYMS
LIST OF NIST DOCUMENTS
REFERENCES
INDEX

ONLINE CHAPTERS AND APPENDICES
Online chapters, appendices, and other documents are Premium Content, available via the access card printed in the front of the book.

Chapter 25 Linux Security
Chapter 26 Windows and Windows Vista Security
Appendix B Some Aspects of Number Theory
Appendix C Standards and Standard-Setting Organizations
Appendix D Random and Pseudorandom Number Generation
Appendix E Message Authentication Codes Based on Block Ciphers
Appendix F TCP/IP Protocol Architecture
Appendix G Radix-64 Conversion
Appendix H The Domain Name System
Appendix I The Base-Rate Fallacy
Appendix J SHA-3
Appendix K Glossary
 

图书序言

图书试读

用户评价

评分

這本《電腦安全:原理與實務》第四版,簡直是給所有對資訊安全感興趣的人的一份大禮包!我不是科班出身,一開始接觸電腦安全都是零散的知識,總覺得學得很吃力。但自從我開始閱讀這本書後,那種「豁然開朗」的感覺就沒有停過。作者們用了非常生動易懂的方式,把原本聽起來很嚇人的「資訊安全」概念,變得清晰明瞭。 像是書中對於「數位足跡」的講解,就讓我非常有感觸,讓我更了解在網路世界裡,我們的一舉一動都可能留下痕跡,以及如何保護自己的隱私。還有關於「身分認證」的部分,從最基本的密碼,到更進階的雙因素認證、生物辨識,都有詳細的解釋,讓我對如何安全地證明自己的身分有了全新的認識。書中還花了很大的篇幅介紹各種「預防措施」,像是如何辨識網路釣魚、如何設定安全的密碼、如何保護個人資料等等,這些都是非常貼近生活,實用性極強的內容。就算你不是電腦專業人士,也能從這本書中獲益匪淺。

评分

這本《電腦安全:原理與實務》第四版,對於我這個在軟體開發領域打滾多年的開發者來說,簡直是及時雨!過去在開發過程中,安全問題常常是「事後補救」的,但這本書讓我深刻體認到「安全左移」的重要性。書中對於常見的軟體漏洞,像是 SQL 注入、跨網站腳本(XSS)、緩衝區溢位等等,都有非常深入的剖析,並提供了相對應的預防和修復建議。它不僅僅是告訴你「是什麼」,更是教你「怎麼做」。 我特別欣賞書中對於安全開發生命週期(SDLC)的強調,這對於我們這些需要快速迭代產品的開發團隊來說,提供了非常實用的指導。書中詳細解釋了在需求分析、設計、編碼、測試、部署等各個階段,如何融入安全考量。例如,在設計階段,就如何考慮身分驗證和授權機制的設計;在編碼階段,又有哪些常見的陷阱需要避免。此外,對於漏洞掃描工具、靜態程式碼分析、動態程式碼分析等測試方法,也有相當的介紹,這能幫助我們更有效地發現和解決潛在的安全隱患。

评分

作為一名在學術研究領域深耕的學者,我對《電腦安全:原理與實務》第四版這本著作的嚴謹性與全面性給予高度肯定。它不僅僅是一本教科書,更是一部涵蓋電腦安全各個層面的權威參考文獻。作者團隊在內容的組織上,展現了卓越的學術功底。他們從計算機系統的基本架構出發,逐步引導讀者進入到複雜的安全議題。書中對於作業系統安全,包括存取控制、記憶體保護、核心安全等議題的闡述,邏輯嚴密,分析透徹。 更值得一提的是,本書對於密碼學的處理方式,並非簡單的術語堆砌,而是深入探討了各種密碼演算法的理論基礎、安全性分析以及實際應用。從傳統的對稱與非對稱加密,到哈希函數、數位簽章,再到更複雜的零知識證明等前沿概念,都有精闢的講解。書中對於網路安全協議,如 IPsec、SSH、TLS/SSL 等的介紹,更是做到了精準且詳盡,這對於理解現今網路通訊的安全性至關重要。此外,作者還涵蓋了應用程式安全、資料庫安全、以及資訊安全管理等面向,展現了其對整個學科的宏觀把握。

评分

這本《電腦安全:原理與實務》第四版,真的是讓我眼睛一亮!身為一個在資訊安全領域摸爬滾打好幾年的工程師,我手邊累積的參考書也不算少,但這本絕對是其中的佼佼者。一翻開,就能感受到作者團隊在內容編排上的用心。他們並沒有直接丟出艱澀的術語,而是從最基礎的「為什麼」開始,引導讀者理解電腦安全的核心概念,像是資訊的機密性、完整性與可用性,這三點聽起來簡單,但背後牽涉到的原理可就博大精深了。書中對於各種威脅模型、攻擊手法,例如惡意軟體、社交工程、阻斷服務攻擊等等,都有非常詳盡的介紹,而且舉例都非常貼近實際應用,不會讓人覺得是紙上談兵。 更讓我印象深刻的是,作者並沒有停留在理論層面,而是深入探討了各種安全機制的「實踐」部分。從密碼學的基礎,像是公開金鑰、對稱金鑰的運作原理,到網路安全中的防火牆、入侵偵測系統的設計與部署,以及作業系統的安全加固、應用程式安全開發等,書中都有涵蓋。讓我驚喜的是,他們還觸及了資訊安全管理、法律法規,甚至到了一些比較新穎的領域,像是雲端安全和物聯網安全,這些都是現今資訊安全發展的重要趨勢。整本書的結構非常紮實,邏輯清晰,讀起來就像是在與一位經驗豐富的導師對話,一步步引領你進入電腦安全的世界。

评分

坦白說,一開始我對這本《電腦安全:原理與實務》第四版並沒有抱太大的期待,畢竟市面上類似的書也不少。但實際閱讀後,我不得不承認我錯了!這本書的深度和廣度都遠遠超出了我的想像。作者們對於電腦安全這個廣泛的領域,做到了非常細緻的切割和闡述。他們並沒有把所有東西都擠在一起,而是將其拆解成易於理解的模組。像是第一部分深入淺出地介紹了安全威脅的本質,以及駭客常用的攻擊手法,讓我可以很清楚地了解敵人是怎麼想的,又是怎麼做的。 接著,書中並沒有止步於此,而是花了大量的篇幅去介紹各種防禦機制。我特別喜歡他們對於密碼學的講解,並不是那種死板的數學公式堆砌,而是從歷史淵源、發展脈絡,到不同演算法的優劣勢,都有非常生動的解說。當我讀到關於公鑰基礎設施(PKI)的部分時,簡直有種豁然開朗的感覺,終於理解了憑證、CA 這些概念是如何運作的。除此之外,書中對於網路安全,像是 TCP/IP 協定的安全漏洞、SSL/TLS 的原理、VPN 的架構等,也都有深入的探討。總之,這本書就像是一個寶藏,每次翻閱都能學到新的東西。

相关图书

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 ttbooks.qciss.net All Rights Reserved. 小特书站 版权所有