Bidding has ended on this item.

Posts to:
Posts to:

Details about  Computer Security: Principles and Practices by William Stallings, Lawrie...

See original listing
Computer Security: Principles and Practices by William Stallings, Lawrie...
Item Ended
Item condition:
Like new
01 Oct, 2012 18:26:39 AEST
Starting bid:
AU $60.00
0 bids ]
May not post to United States - Read item description or contact seller for postage options. | See details
Item location:
Tweed/Gold Coast , Australia


eBay item number:
Seller assumes all responsibility for this listing.

Item specifics

Like new: A book that looks new but has been read. Cover has no visible wear, and the dust jacket (if ... Read moreabout the condition
Publisher: Pearson Education Limited
Educational Level: University, TAFE Product Type: Textbook
Language: English Subject: Computers, Internet
Format: Paperback

Detailed item info

Key Features
Author(s)Lawrie Brown, William Stallings
PublisherPearson Education Limited
Date of Publication17/01/2012
FormatMixed media product
SubjectComputing: Professional & Programming

Publication Data
Place of PublicationHarlow
Country of PublicationUnited Kingdom
ImprintPearson Education Limited
Content NoteIllustrations

Weight996 g
Width178 mm
Height232 mm

Editorial Details
Contained items statementContains Paperback and Online resource
Edition StatementInternational ed of 2nd revised ed

Table Of ContentsOnline Resources xiii Notation xiv About the Authors xv Preface xvii Chapter 0 Reader's and Instructor's Guide 1 0.1 Outline of This Book 2 0.2 A Roadmap for Readers and Instructors 2 0.3 Support for CISSP Certification 3 0.4 Internet and Web Resources 5 0.5 Standards 7 Chapter 1 Overview 9 1.1 Computer Security Concepts 10 1.2 Threats, Attacks, and Assets 18 1.3 Security Functional Requirements 23 1.4 A Security Architecture for Open Systems 26 1.5 Computer Security Trends 31 1.6 Computer Security Strategy 33 1.7 Recommended Reading and Web Sites 35 1.8 Key Terms, Review Questions, and Problems 36 PART ONE: COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES 38 Chapter 2 Cryptographic Tools 38 2.1 Confidentiality with Symmetric Encryption 39 2.2 Message Authentication and Hash Functions 46 2.3 Public-Key Encryption 54 2.4 Digital Signatures and Key Management 59 2.5 Random and Pseudorandom Numbers 62 2.6 Practical Application: Encryption of Stored Data 64 2.7 Recommended Reading and Web Sites 66 2.8 Key Terms, Review Questions, and Problems 67 Chapter 3 User Authentication 71 3.1 Means of Authentication 73 3.2 Password-Based Authentication 73 3.3 Token-Based Authentication 84 3.4 Biometric Authentication 88 3.5 Remote User Authentication 93 3.6 Security Issues for User Authentication 95 3.7 Practical Application: An Iris Biometric System 97 3.8 Case Study: Security Problems for ATM Systems 99 3.9 Recommended Reading and Web Sites 101 3.10 Key Terms, Review Questions, and Problems 103 Chapter 4 Access Control 105 4.1 Access Control Principles 106 4.2 Subjects, Objects, and Access Rights 110 4.3 Discretionary Access Control 111 4.4 Example: UNIX File Access Control 118 4.5 Role-Based Access Control 121 4.6 Case Study: RBAC System for a Bank 129 4.7 Recommended Reading and Web Site 132 4.8 Key Terms, Review Questions, and Problems 133 Chapter 5 Database Security 137 5.1 The Need for Database Security 138 5.2 Database Management Systems 139 5.3 Relational Databases 141 5.4 Database Access Control 144 5.5 Inference 149 5.6 Statistical Databases 152 5.7 Database Encryption 162 5.8 Cloud Security 166 5.9 Recommended Reading and Web Site 172 5.10 Key Terms, Review Questions, and Problems 173 Chapter 6 Malicious Software 178 6.1 Types of Malicious Software (Malware) 179 6.2 Propagation Infected Content Viruses 182 6.3 Propagation Vulnerability Exploit Worms 188 6.4 Propagation Social Engineering SPAM E-mail, Trojans 195 6.5 Payload System Corruption 197 6.6 Payload Attack Agent Zombie, Bots 199 6.7 Payload Information Theft Keyloggers, Phishing, Spyware 201 6.8 Payload Stealthing Backdoors, Rootkits 202 6.9 Countermeasures 206 6.10 Recommended Reading and Web Sites 215 6.11 Key Terms, Review Questions, and Problems 216 Chapter 7 Denial-of-Service Attacks 220 7.1 Denial-of-Service Attacks 221 7.2 Flooding Attacks 228 7.3 Distributed Denial-of-Service Attacks 230 7.4 Application-Based Bandwidth Attacks 232 7.5 Reflector and Amplifier Attacks 234 7.6 Defenses Against Denial-of-Service Attacks 239 7.7 Responding to a Denial-of-Service Attack 243 7.8 Recommended Reading and Web Sites 244 7.9 Key Terms, Review Questions, and Problems 245 Chapter 8 Intrusion Detection 248 8.1 Intruders 249 8.2 Intrusion Detection 253 8.3 Host-Based Intrusion Detection 256 8.4 Distributed Host-Based Intrusion Detection 263 8.5 Network-Based Intrusion Detection 265 8.6 Distributed Adaptive Intrusion Detection 270 8.7 Intrusion Detection Exchange Format 273 8.8 Honeypots 275 8.9 Example System: Snort 277 8.10 Recommended Reading and Web Sites 281 8.11 Key Terms, Review Questions, and Problems 282 Chapter 9 Firewalls and Intrusion Prevention Systems 285 9.1 The Need for Firewalls 286 9.2 Firewall Characteristics 287 9.3 Types of Firewalls 288 9.4 Firewall Basing 296 9.5 Firewall Location and Configurations 298 9.6 Intrusio

Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.

Computer Security, Principles and Practice

International Edition

Author: William Stallings, Lawrie Brown

ISBN: 9780132775069

Second Edition

good condition, some curling in the corners...

Questions and answers about this item

No questions or answers have been posted about this item.

Place bid

Time left:
Current bid:
(Approximately ##1##)
Import charges:
Your max bid:
Your max bid:
By clicking Confirm bid, you commit to buy this item from the seller if you're the winning bidder.
By clicking Confirm bid, you are committing to buy this item from the seller if you are the winning bidder and have read and agreed to the Global Shipping Program terms and conditions - opens in a new window or tab. Import charges previously quoted are subject to change if you increase you maximum bid amount.
Resume bidding, if the page does not update immediately.
Place bid
Review and confirm your bid
Bid confirmation
FREE postage
See item description
(Approximately ##1##)
(Enter ##1## or more)
(Enter more than ##1##)
Your max bid:
Increase max bid
Place bid
Confirm bid
Increase max bid
Change bid
, you've been outbid. Don't let it get away - bid again!
, you're the highest bidder on this item. Good luck
, you're the first bidder. Hope you win!
, you're currently the high bidder, but you're close to getting outbid.
, this auction is almost over and you're currently the high bidder.
, you're the high bidder, but the reserve price hasn't been met.
Please enter your bid again.
Please enter a valid number as the bid price.
Enter an amount that is equal or greater than the minimum bid required. This can be found under the bid entry box.
Maximum bids can't be lowered once they're submitted.
This seller requires the buyer to have a PayPal account to purchase this item. Get a PayPal account here .
Your bid is greater than or equal to the Buy It Now price. We recommend you purchase this item via Buy It Now. If you still wish to bid, you may do so below.
Time left:
Current bid:
(approximately ##1##)
Your maximum bid:
(approximately ##1##)
Increase your maximum bid:
By clicking 1 Click Bid, you commit to buy this item from the seller if you're the winning bidder. Learn moreabout 1-click bid - opens in a new window or tab
(approximately ##1##)
Winning bid:
Starting bid:
Congratulations! The auction has ended and you're the winner.
The auction has ended, but the reserve price was not met.
Sorry, the auction has ended and you were outbid.
Good news, you're the high bidder.
Sorry, you've been outbid.
You're the high bidder, but the reserve price is not met.
Please enter a higher amount than the current bid.
Maximum bids can't be lowered once submitted.
Please enter a valid number.