Preface
About the Authors
Notation
Acronyms
Chapter 0 Reader﹀s and Instructor﹀s Guide
Chapter 1 Overview
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
Chapter 3 User Authentication
Chapter 4 Access Control
Chapter 5 Database Security
Chapter 6 Intrusion Detection
Chapter 7 Malicious Software
Chapter 8 Denial of Service
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 10 Trusted Computing and Multilevel Security
PART TWO SOFTWARE SECURITY
Chapter 11 Buffer Overflow
Chapter 12 Other Software Security Issues
PART THREE MANAGEMENT ISSUES
Chapter 13 physical and Infrastructure Security
Chapter 14 Human Factors
Chapter 15 Security Auditing
Chapter 16 IT Security Management and Risk Assessment
Chapter 17 IT Security Controls, Plans and Procedures
Chapter 18 Legal and Ethical Aspects
PART FOUR CRYPTOGRAPHIC ALGORITHMS
Chapter 19 Symmetric Encryption and Message Confidentiality
Chapter 20 Public-Key Cryptography and Message Authentication
PART FIVE INTERNET SECURITY
Chapter 21 Internet Security Protocols and Standards
Chapter 22 Internet Authentication Applications
PART SIX OPERATING SYSTEM SECURITY
Chapter 23 Linux Security 690
Chapter 24 Windows and Windows Vista Security
APPENDICES
Appendix A Some Aspects of Number Theory
Appendix B Random and Pseudorandom Number Generation
Appendix C Projects for Teaching Computer Security
References
Index
ONLINE APPENDICES
Appendix D Standards and Standard-Setting Organizations
Appendix E TCP/IP Protocol Architecture
Appendix F Glossary