Table of contents for Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
Contents 
Foreword
Preface
Chapter 1 Is There a Security Problem in Computing?
1.1 What Does "Secure" Mean?
1.2 Attacks
1.3 The Meaning of Computer Security
1.4 Computer Criminals
1.5 Methods of Defense
1.6 What's Next
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
2.1 Terminology and Background
2.2 Substitution Ciphers
2.3 Transpositions (Permutations)
2.4 Making "Good" Encryption Algorithms
2.5 The Data Encryption Standard (DES)
2.6 The AES Encryption Algorithm
2.7 Public Key Encryption
2.8 The Uses of Encryption
2.9 Summary of Encryption
2.10 Terms and Concepts
2.11 Where the Field is Headed
2.12 To Learn More
2.13 Exercises
Chapter 3 Program Security
3.1 Secure Programs
3.2 Nonmalicious Program Errors
3.3 Viruses and Other Malicious Code
3.4 Targeted Malicious Code
3.5 Controls Against Program Threats
3.6 Summary of Program Threats and Controls
3.7 Terms and Concepts
3.8 Where the Field Is Headed
3.9 To Learn More
3.10 Exercises
Chapter 4 Protection in General-Purpose Operating Systems
4.1 Protected Objects and Methods of Protection
4.2 Memory and Address Protection
4.3 Control of Access to General Objects
4.4 File Protection Mechanisms
4.5 User Authentication
4.6 Summary of Security for Users
4.7 Terms and Concepts
4.8 Where the Field Is Headed
4.9 To Learn More
4.10 Exercises
Chapter 5 Designing Trusted Operating Systems
5.1 What Is a Trusted System?
5.2 Security Policies
5.3 Models of Security
5.4 Trusted Operating System Design
5.5 Assurance in Trusted Operating Systems
5.6 Summary of Security in Operating Systems
5.7 Terms and Concepts
5.8 Where the Field Is Headed
5.9 To Learn More
5.10 Exercises
Chapter 6 Database and Data Mining Security
6.1 Introduction to Databases
6.2 Security Requirements
6.3 Reliability and Integrity
6.4 Sensitive Data
6.5 Inference
6.6 Multilevel Databases
6.7 Proposals for Multilevel Security
6.8 Data Mining
6.9 Summary of Database Security
6.10 Terms and Concepts
6.11 Where the Field Is Headed
6.12 To Learn More
6.13 Exercises
Chapter 7 Security in Networks
7.1 Network Concepts
7.2 Threats in Networks
7.3 Network Security Controls
7.4 Firewalls
7.5 Intrusion Detection Systems
7.6 Secure E-Mail
7.7 Summary of Network Security
7.8 Terms and Concepts
7.9 Where the Field Is Headed
7.10 To Learn More
7.11 Exercises
Chapter 8 Administering Security
8.1 Security Planning
8.2 Risk Analysis
8.3 Organizational Security Policies
8.4 Physical Security
8.5 Summary
8.6 Terms and Concepts
8.7 To Learn More
8.8 Exercises
Chapter 9 The Economics of Cybersecurity
9.1 Making a Business Case
9.2 Quantifying Security
9.3 Modeling Cybersecurity
9.4 Current Research and Future Directions
9.5 Summary
9.6 Terms and Concepts
9.7 To Learn More
9.8 Exercises
Chapter 10 Privacy in Computing
10.1	PRIVACY CONCEPTS
10.2 Privacy Principles and Policies
10.3	AUTHENTICATION AND PRIVACY
10.4	Data Mining
10.5	Privacy on the WEB
10.6	E-mail Security
10.7	IMPACTS on Emerging Technologies
10.8 Summary
10.9 Terms and Concepts
10.10 Where the Field is Headed
10.11 To Learn More
10.12 Exercises
Chapter 11 Legal and Ethical Issues in Computer Security
11.1 Protecting Programs and Data
11.2 Information and the Law
11.3 Rights of Employees and Employers
11.4 Redress for Software Failures
11.5 Computer Crime
11.6 Ethical Issues in Computer Security
11.7 Case Studies of Ethics
11.8 Terms and Concepts
11.9 To Learn More
11.10 Exercises
Chapter 12 Cryptography Explained
12.1 Mathematics for Cryptography
12.2 Symmetric Encryption
12.3 Public Key Encryption Systems
12.4 Quantum Cryptography
12.5 Summary of Encryption
12.6 Terms and Concepts
12.7 Where the Field Is Headed
12.8 To Learn More
12.9 Exercises
Index

Library of Congress Subject Headings for this publication:

Computer security.
Data protection.
Privacy, Right of.