Introduction to Computer and Network Security: Navigating Shades of Gray
By: Richard R. Brooks (author)Hardback
Only 1 in stock
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues
Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security.
The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems.
Extensively classroom-tested, the material is structured around a set of challenging projects. Through staging exploits and choosing countermeasures to neutralize the attacks in the projects, students learn:
How computer systems and networks operateHow to reverse-engineer processesHow to use systems in ways that were never foreseen (or supported) by the original developers
Combining hands-on work with technical overviews, this text helps you integrate security analysis into your technical computing curriculum. It will educate your students on security issues, such as side-channel attacks, and deepen their understanding of how computers and networks work.
Richard R. Brooks is an associate professor in the Holcombe Department of Electrical and Computer Engineering at Clemson University. His research has been sponsored by both government and industry, including the U.S. Office of Naval Research, Defense Advanced Research Projects Agency, National Institute of Standards and Technology, National Science Foundation, and BMW Manufacturing Co. He received a Ph.D. in computer science from Louisiana State University.
Brief History of Computers, Communications, and SecurityPre-RenaissanceRenaissance to World War IWorld War IWorld War IICold WarOrganized Crime and BotnetsCyberwar Security and Privacy OverviewSecurity AttributesSocial EngineeringAuthentication and AuthorizationAccess PermissionsAuditUser Interface IssuesOn Trusting TrustTaxonomy of AttacksCase Study-Mobile CodeCase Study-Connected Vehicles Cryptography PrimerSubstitution Ciphers and Frequency AnalysisVignere Cipher and CryptanalysisBlock CiphersRSA Public Key CryptographyHash Functions One-Time Pads Key ManagementMessage ConfidentialitySteganographyObfuscation and Homomorphic Encryption SSL/TLS-Case Study ProjectCryptographic ProtocolVerificationDNS and RoutingX.509 and SSL CertificatesSecurity Flaws With CertificatesMan-in-the-Middle AttacksImplementation FlawsUsability Securing NetworksFirewallsVirtual Private Networks (VPNs)Wireless SecurityIntrusion Detection Systems (IDS)Denial of Service Virtual Private Network-Case Study ProjectLaboratory PreparationAssignmentVirtual Machine (VM) UseSniffer UseVPN Installation Insertion AttacksSQL InjectionBuffer Overflow AttackPrinter Format VulnerabilitySSH Insertion Attacks IDS Insertion AttacksVirusesWormsVirus and Worm Propagation Buffer Overflow-Case Study ProjectStack SmashingHeap SmashingArc InjectionPointer ClobberingCountermeasures Polymorphic Virus-Advanced Case Study ProjectVirus Basics Antivirus Pseudovirus with Alternate Data Streams Simple Virus-Timid Infection Spreading Self-Modifying Code Simple Polymorphism Packing and Encryption Frankenstein Viruses Web SecurityCross Site Scripting (XSS)Cross Site Request Forgery (XSRF, CSRF)Man-in-the-BrowserPenetration Testing Privacy and AnonymityAnonymity MetricsAnonymity ToolsComputer Forensics ToolsPrivacy LawsPrivacy Discussion Assignments-Antonin Scalia Side-Channel AttacksPower AnalysisTraffic AnalysisTime AnalysisRed-Black SeparationSide-Channel Countermeasures Digital Rights Management and CopyrightCopyright HistoryFair UseCreative CommonsDigital Rights Management Digital Millennium Copyright Act The Darknet Patent Trolls Discussion Assignment-Business Case for DRM Discussion Assignment-Technical Case for DRM Security EconomicsLiability and EULAsNetwork ExternalitiesCode BloatLemon MarketsSoftware EngineeringMacroeconomics and Game Theory Introduction Conclusions Bibliography Index Problems and a Glossary appear at the end of each chapter.
Number Of Pages:
- ID: 9781439860717
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2018 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36