Book Details

Instructors may access teaching resources by clicking the ‘Request Instructor Resources’ tab next to the title.
Please note that you can subscribe to a maximum of 0 titles.

Security in Computing, 5/e


Security in Computing, 5/e
Author(s)  Charles P. Pfleeger, Jonathan Margulies and Shari Lawrence Pfleeger
ISBN  9789352866533
Imprint  Pearson Education
Copyright  2018
Pages  944
Binding  Paperback
List Price  Rs. 1155.00
  
 
 

This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more.
 

  • About the Authors
  • Contents
  • Features
  • Downloadable Resources

Charles Pfleeger is an internationally known expert on computer and communications security. He was originally a professor at the University of Tennessee, leaving there to join computer security research and consulting companies Trusted Information Systems and Arca Systems (later Exodus Communications and Cable and Wireless). With Trusted Information Systems he was Director of European Operations and Senior Consultant. With Cable and Wireless he was Director of Research and a member of the staff of the Chief Security Officer.  He was chair of the IEEE Computer Society Technical Committee on Security and Privacy.



Shari Lawrence Pfleeger is widely known as a software engineering and computer security researcher, most recently as a Senior Computer Scientist with the Rand Corporation and as Research Director of the Institute for Information Infrastructure Protection. She is currently Editor in Chief of IEEE Security & Privacy magazine.


 



Jonathan Margulies is the CTO of Qmulos, a cybersecurity consulting firm. After receiving his Masters Degree in Computer Science from Cornell University, Mr. Margulies spent nine years at Sandia National Labs, researching and developing solutions to protect national security and critical infrastructure systems from advanced persistent threats. He then went on to NIST's National Cybersecurity Center of Excellence, where he worked with a variety of critical infrastructure companies to create industry-standard security architectures. In his free time, Mr. Margulies edits the "Building Security In" section of  IEEE Security & Privacy magazine.


 

 

Foreword        


Preface        


Acknowledgments        


About the Authors        


 Chapter 1: Introduction        


 Chapter 2: Toolbox: Authentication, Access Control, and Cryptography        


Chapter 3: Programs and Programming        


Chapter 4: The Web—User Side        


Chapter 5: Operating Systems        


Chapter 6: Networks        


Chapter 7: Databases         


Chapter 8: Cloud Computing        


Chapter 9: Privacy        


Chapter 10: Management and Incidents       


Chapter 11: Legal Issues and Ethics        


Chapter 12: Details of Cryptography        


Chapter 13: Emerging Topics        


Bibliography         


 


 

 

This classic text has been thoroughly updated to reflect today's newest technologies, standards, and trends


Topics progress from simple and straightforward to complex and intricate


Easy-to-read descriptions of concepts and incidents


As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor use"


 

 
 
Username/ Email  
Password  
If you are new to this site, and you do not have a username and password, please register.