Security in computing:
Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, NJ
Prentice-Hall
1997
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired. |
Beschreibung: | XVIII, 574 S. Ill., graph. Darst. |
ISBN: | 0133374866 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV011142308 | ||
003 | DE-604 | ||
005 | 20060302 | ||
007 | t | ||
008 | 970113s1997 ad|| |||| 00||| eng d | ||
020 | |a 0133374866 |9 0-13-337486-6 | ||
035 | |a (OCoLC)35096116 | ||
035 | |a (DE-599)BVBBV011142308 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-29T |a DE-706 |a DE-188 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 20 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
100 | 1 | |a Pfleeger, Charles P. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in computing |c Charles P. Pfleeger |
250 | |a 2. ed. | ||
264 | 1 | |a Upper Saddle River, NJ |b Prentice-Hall |c 1997 | |
300 | |a XVIII, 574 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired. | |
650 | 7 | |a Beveiliging |2 gtt | |
650 | 7 | |a Computers |2 gtt | |
650 | 4 | |a Droit à la vie privée | |
650 | 4 | |a Privacía, Derecho de | |
650 | 4 | |a Procesamiento electrónico de datos - Medidas de seguridad | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Privacy, Right of | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007467857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-007467857 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804125635134619648 |
---|---|
adam_text | 1111__ -- * IIIMIITLLL SECURITY IN COMPUTING SECOND EDITION CHARLES P.
PFLEEGER TRUSTED INFORMATION SYSTEMS, INC. PRENTICE-HALL INTERNATIONAL,
INC. CONTENTS PREFACE 1 ISTHERE A SECURITY PROBLEM IN COMPUTING? 1.1
CHARACTERISTICS OF COMPUTER INTRUSION 3 1.2 KINDS OF SECURITY BREACHES 3
1.3 SECURITY GOALS AND VULNERABILITIES 4 SECURITY GOALS, 4
VULNERABILITIES, 6 SUMMARY OFEXPOSURES, 11 1.4 THE PEOPLE INVOLVED 11
AMATEURS, 12 CRACKERS, 12 CAREER CRIMINALS, 13 1.5 METHODS OF DEFENSE 13
CONTROLS, 13 EFFECTIVENESS OF CONTROLS, 15 1.6 PLANOFATTACK 15
ENCRYPTION, 16 HARDWARE AND SOFTWARE SECURITY, 16 HUMAN CONTROLS IN
SECURITY, 17 1.7 SUMMARY 17 1.8 BIBLIOGRAPHIE NOTES 18 1.9 TERMS AND
CONCEPTS 18 1.10 EXERCISES 19 * BASIC ENCRYPTION AND DECRYPTION 2.1
TERMINOLOGY AND BACKGROUND 21 TERMINOLOGY, 22 REPRESENTATION OF
CHARACTERS, 24 2.2 MONOALPHABETIC CIPHERS (SUBSTITUTIONS) 25 THE CAESAR
CIPHER, 25 OTHER MONOALPHABETIC SUBSTITUTIONS, 27 CRYPTANALYSIS OF
MONOALPHABETIC CIPHERS, 28 2.3 POLYALPHABETIC SUBSTITUTION CIPHERS 31
VIGENERE TABLEAUX, 33 CRYPTANALYSIS OF POLYALPHABETIC SUBSTITUTIONS, 35
CONCLUDING REMARKS ON POLYALPHABETIC CIPHERS, 40 THE PERFECT
SUBSTITUTION CIPHER, 40 SUMMARY OF SUBSTITUTIONS, 46 2.4 TRANSPOSITIONS
(PERMUTATIONS) 47 COLUMNAR TRANSPOSITIONS, 47 GENERALIZED
TRANSPOSITIONS, 53 2.5 FRACTIONATED MORSE 53 MORSE CODE, 53 MORSE CODE
FOR ENCRYPTION, 54 CRYPTANALYSIS OF FRACTIONATED MORSE, 55 2.6 STREAM
AND BLOCK CIPHERS 55 2.7 CHARACTERISTICS OF GOOD CIPHERS 58 SHANNON
CHARACTERISTICS, 58 CONFUSION AND DIFFUSION, 59 INFORMATION THEORETIC
TESTS, 59 UNICITY DISTANCE, 62 2.8 WHAT THE CIYPTANALYST HAS TO WORK
WITH 63 CIPHERTEXT ONLY, 63 FUELL OR PARTIAL PLAINTEXT, 63 CIPHERTEXT
OFANY PLAINTEXT, 64 ALGORITHM AND CIPHERTEXT, 64 2.9 SUMMARY OF BASIC
ENCRYPTION 64 2.10 BIBLIOGRAPHIE NOTES 65 2.11 TERMS AND CONCEPTS 65
2.12 EXERCISES 66 CONTENTS 3 SECURE ENCRYPTION SYSTEMS 3.1 HARD
PROBLEMS: COMPLEXITY 70 NP-COMPLETE PROBLEMS, 71 CHARACTERISTICS OF
NP-COMPLETE PROBLEMS, 72 THE MEANING OFNP-COMPLETENESS, 75
NP-COMPLETENESS AND CRYPTOGRAPHY, 76 3.2 PROPERTIES OF ARITHMETIC 77
INVERSES, 77 3.3 PUBLIC KEY ENCRYPTION SYSTEMS 82 MOTIVATION, 82 3.4
MERKLE-HELLMAN KNAPSACKS 83 INTRODUCTION TO MERKLE-HELLMAN KNAPSACKS, 83
DETAILED EXPLANATION OFTHE MERKLE-HELLMAN TECHNIQUE, 84 THE ENCRYPTION
TECHNIQUE, 85 3.5 RIVEST-SHAMIR-ADELMAN (RSA) ENCRYPTION 91 INTRODUCTION
TO THE RSA ALGORITHM, 91 DETAILED DESCRIPTION OFTHE ENCRYPTION
ALGORITHM, 93 3.6 EL GAMAL AND DIGITAL SIGNATURE ALGORITHMS 96 EL GAMAL
ALGORITHM, 96 DIGITAL SIGNATURE ALGORITHM, 96 3.7 HASH ALGORITHMS 97
DESCRIPTION OFHASH ALGORITHMS, 97 SECURE HASH ALGORITHM, 98 3.8 SECURE
SECRET KEY (SYMMETRIE) SYSTEMS 99 ADVANTAGES AND DISADVANTAGES, 100
PROBLEMS OF SYMMETRIE KEY SYSTEMS, 100 3.9 THE DATA ENCRYPTION STANDARD
(DES) 100 BACKGROUND AND HISTORY, 101 OVERVIEW OFTHE DES ALGORITHM, 103
DETAILS OFTHE ENCRYPTION ALGORITHM, 103 DECRYPTION OFTHE DES, 110
QUESTIONS ABOUT THE SECURITY OFTHE DES, 112 WEAKNESSES OFTHE DES, 114
SECURITY OFTHE DES, 116 3.10 KEY ESCROW AND CLIPPER 118 THE CLIPPER
PROGRAM, 118 CONCLUSIONS, 121 VI CONTENTS 3.11 SUMMARY OF SECURE
ENCRYPTION 122 3.12 BIBLIOGRAPHIE NOTES 122 3.13 TERMS AND CONCEPTS 123
3.14 EXERCISES 124 4 USING ENCRYPTION: PROTOCOLS AND PRACTICES 126 4.1
PROTOCOLS: ORDERLY BEHAVIOR 126 DEFINITION OF PROTOCOLS, 126 KINDS OF
PROTOCOLS, 127 4.2 PROTOCOLS TO SOLVE PROBLEMS 129 KEY DISTRIBUTION, 129
DIGITAL SIGNATURES, 140 KEY ESCROW, 145 MENTAL POKER, 148 VOTING BY
COMPUTER, 151 OBLIVIOUS TRANSFER, 153 CONTRACT SIGNING, 155 CERTIFIED
MAIL, 158 4.3 HOW TO USE ENCRYPTION 159 AMOUNT OFSECRECY, 160 KEY
MANAGEMENT, 161 LOST (REVEALED) KEYS, 161 COMPLEXITY TO ENCRYPT, 161
PROPAGATION OFERRORS, 162 SIZE OF CIPHERTEXT, 163 4.4 ENHANCING
CRYPTOGRAPHIC SECURITY 163 ERROR PREVENTION AND DETECTION, 163 ONE-WAY
ENCRYPTION, 166 4.5 MODESOF ENCRYPTION 169 CIPHER BLOCK CHAIN, 169 TWO
KEYS GIVE THE EFFECT OFA 112-BIT KEY, 171 4.6 SUMMARY OF PROTOCOLS AND
PRACTICES 172 4.7 BIBLIOGRAPHIE NOTES 172 4.8 TERMS AND CONCEPTS 173 4.9
EXERCISES 173 CONTENTS VII 5 PROGRAM SECURITY 176 5.1 VIRUSES AND OTHER
MALICIOUS CODE 177 WHY WORRYABOUTMALICIOUS CODE? 177 KINDS OF MALICIOUS
CODE, 179 HOW VIRUSES ATTACH, 180 HOW VIRUSES GAIN CONTROL, 182 HOMESFOR
VIRUSES, 183 VIRUS SIGNATURES, 186 THE SOURCE OF VIRUSES, 189 PREVENTING
VIRUS INFECTION, 189 TRUTHS AND MISCONCEPTIONS ABOUT VIRUSES, 190 VIRUS
EXAMPLE: BRAIN VIRUS, 191 OTHER MALICIOUS CODE EXAMPLE: INTERNET WORM,
192 5.2 TARGETED MALICIOUS CODE 195 TRAPDOORS, 195 SALAMI ATTACK, 198
COVERT CHANNELS: PROGRAMS THAT LEAK INFORMATION, 199 5.3 CONTROLS
AGAINST PROGRAM THREATS 207 PROGRAMMING CONTROLS, 207 PROCESS
IMPROVEMENT, 214 OPERATING SYSTEM CONTROLS ON USE OF PROGRAMS, 221
ADMINISTRATIVE CONTROLS, 223 5.4 SUMMARY OF PROGRAM THREATS AND CONTROLS
224 5.5 BIBLIOGRAPHIE NOTES 224 5.6 TERMS AND CONCEPTS 225 5.7 EXERCISES
226 6 PROTECTION IN GENERAL-PURPOSE OPERATING SYSTEMS 228 6.1 PROTECTED
OBJECTS AND METHODS OF PROTECTION 228 ABITOFHISTORY, 228 PROTECTED
OBJECTS, 229 SECURITY METHODS OF OPERATING SYSTEMS, 229 6.2 PROTECTING
MEMORY AND ADDRESSING 231 FENCE, 231 RELOCATION, 232 BASE/BOUNDS
REGISTERS, 233 TAGGEDARCHITECTURE, 234 SEGMENTATION, 236 PAGING, 239
COMBINED PAGING WITH SEGMENTATION, 241 J VIII CONTENTS 6.3 PROTECTING
ACCESS TO GENERAL OBJECTS 242 DIRECTORY, 243 ACCESS CONTROL LIST, 244
ACCESS CONTROL MATRIX, 246 CAPABILITY, 247 PROCEDURE-ORIENTED ACCESS
CONTROL, 249 6.4 FILE PROTECTION MECHANISMS 250 BASIC FORMS OF
PROTECTION, 250 SINGLE PERMISSIONS, 252 PER-OBJECT AND PER- USER
PROTECTION, 254 6.5 USER AUTHENTICATION 254 USE OFPASSWORDS, 255 ATTACKS
ON PASSWORDS, 256 PASSWORD SELECTION CRITERIA, 260 THE AUTHENTICATION
PROCESS, 263 FLAWS IN THE AUTHENTICATION PROCESS, 263 AUTHENTICATION
OTHER THAN PASSWORDS, 264 6.6 SUMMARY OF SECURITY FOR USERS 264 6.7
BIBLIOGRAPHIE NOTES 265 6.8 TERMS AND CONCEPTS 265 6.9 EXERCISES 266 7
DESIGNING TRUSTED OPERATING SYSTEMS 269 7.1 WHAT IS A TRUSTED SYSTEM?
270 7.2 SECURITY POLICIES 271 MILITARY SECURITY POLICY, 271 COMMERCIAL
SECURITY POLICIES, 273 7.3 MODELS OF SECURITY 276 MULTILEVEL SECURITY,
277 MODELS PROVING THEORETICAL LIMITATIONS OFSECURITY SYSTEMS, 280
SUMMARY OF MODELS OF PROTECTION SYSTEMS, 286 7.4 DESIGN OF TRUSTED
OPERATING SYSTEMS 286 TRUSTED SYSTEM DESIGN ELEMENTS, 286 SECURITY
FEATURES OFORDINARY OPERATING SYSTEMS, 287 SECURITY FEATURES OF TRUSTED
OPERATING SYSTEMS, 289 KEMELIZED DESIGN, 292 SEPARATION/ISOLATION, 297
VIRTUALIZATION, 298 LAYERED DESIGN, 302 CONTENTS IX 7.5 ASSURANCE IN
TRUSTED OPERATING SYSTEMS 306 TYPICAL OPERATING SYSTEM FLAWS, 306
ASSURANCE METHODS, 308 EVALUATION, 313 WHAT DOESN T LEAD TO ASSURANCE ?
324 7.6 IMPLEMENTATION EXAMPLES 325 GENERAL PURPOSE OPERATING SYSTEMS,
325 OPERATING SYSTEMS DESIGNEDFOR SECURITY, 328 1.1 SUMMARY OF SECURITY
IN OPERATING SYSTEMS 329 7.8 BIBLIOGRAPHIE NOTES 331 7.9 TERMS AND
CONCEPTS 332 7.10 EXERCISES 333 8 DATA BASE SECURITY 336 8.1
INTRODUCTION TO DATA BASES 336 CONCEPT OFA DATA BASE, 337 ADVANTAGES
OFUSING DATA BASES, 339 8.2 SECURITY REQUIREMENTS 340 INTEGRITY OFTHE
DATA BASE, 340 ELEMENT INTEGRITY, 341 AUDITABUEITY, 342 ACCESS CONTROL,
342 USER AUTHENTICATION, 343 AVAILABILITY, 343
INTEGRITY/SECRECY/AVAILABILITY, 343 8.3 RELIABILITY AND INTEGRITY 343
PROTECTION FEATURES FROM THE OPERATING SYSTEM, 344 TWO-PHASE UPDATE, 344
REDUNDANCY/INTERNAL CONSISTENCY, 346 RECOVERY, 347
CONCURRENCY/CONSISTENCY, 347 MONITORS, 348 SUMMARY OFDATA RELIABILITY,
349 8.4 SENSITIVE DATA 349 ACCESS DECISIONS, 350 AVAILABILITY OFDATA,
351 TYPES OF DISCLOSURES, 352 SECURITY VERSUS PRECISION, 353 X CONTENTS
8.5 INFERENCE PROBLEM 353 DIRECT ATTACK, 355 INDIRECT ATTACK, 355
CONCLUSION ON THE INFERENCE PROBLEM, 360 8.6 MULTILEVEL DATA BASES 361
THE CASE FOR DIFFERENTIATED SECURITY, 361 GRANULARITY, 362 SECURITY
ISSUES, 363 8.7 PROPOSALS FOR MULTILEVEL SECURITY 364 PARTITIONING, 364
ENCRYPTION, 364 INTEGRITY LOCK, 365 INTEGRITY LOCK DBMS, 367 TRUSTED
FRONT-END, 368 DISTRIBUTED DATA BASES, 370 WINDOW/VIEW, 370 CONCLUDING
REMARKS, 372 8.8 SUMMARY OF DATA BASE SECURITY 372 8.9 BIBLIOGRAPHIE
NOTES 373 8.10 TERMS AND CONCEPTS 374 8.11 EXERCISES 375 9 SECURITY IN
NETWORKS AND DISTRIBUTED SYSTEMS 377 9.1 NETWORK CONCEPTS 378
COMMUNICATIONS, 379 MEDIA, 379 PROTOCOLS, 381 ADDRESSING, 384 TYPES OF
NETWORKS, 385 TOPOLOGIES, 387 DISTRIBUTED SYSTEMS, 387 ADVANTAGES OF
COMPUTING NETWORKS, 389 9.2 THREATS IN NETWORKS 390 NETWORK SECURITY
ISSUES, 390 SECURITY THREAT ANALYSIS, 391 WIRETAPPING, 395
IMPERSONATION, 397 MESSAGE CONFLDENTIALITY VIOLATIONS, 400 MESSAGE
INTEGRITY VIOLATIONS, 401 HACKING, 402 CODE INTEGRITY, 402 DENIAL OF
SERVICE, 404 CONTENTS 9.3 NETWORK SECURITY CONTROLS 405 ENCRYPTION, 406
ACCESS CONTROL, 409 AUTHENTICATION IN DISTRIBUTED SYSTEMS, 411 TRAFFIC
CONTROL, 418 DATA INTEGRITY, 419 SUMMARY OF NETWORK SECURITY CONTROL
TECHNIQUES, 422 9.4 PRIVACY ENHANCED ELECTRONIC MAIL 422 REQUIREMENTS
AND SOLUTIONS, 422 PEM, 423 PGP, 426 9.5 FIREWALLS 426 DESIGN OF
FIREWALLS, 428 WHAT IS A FIREWALL? 428 TYPES OF FIREWALLS, 428 EXAMPLE
FIREWALL CONFIGURATIONS, 434 WHAT FIREWALLS CAN * AND CANNOT * BLOCK,
435 9.6 ENCRYPTING GATEWAY 436 9.7 MULTILEVEL SECURITY ON NETWORKS 437
TRUSTED NETWORK INTERFACE, 437 SECURE COMMUNICATION, 439 9.8 SUMMARY OF
NETWORK SECURITY 442 9.9 BIBLIOGRAPHIE NOTES 443 9.10 TERMS AND CONCEPTS
443 9.11 EXERCISES 444 10 ADMINISTERING SECURITY 10.1 PERSONAL COMPUTER
SECURITY MANAGEMENT 447 CONTRIBUTORS TO SECURITY PROBLEMS, 448 SECURITY
MEASURES, 450 PROTECTION FOR FILES, 452 SUMMARY OF PERSONAL COMPUTER
SECURITY, 454 10.2 UNIX SECURITY MANAGEMENT 454 CURRENT SOFTWARE, 455
ACCOUNTS, 455 PRIVILEGES, 456 AUDIT, 457 PASSWORDS, 457 . XII CONTENTS
10.3 NETWORK SECURITY MANAGEMENT 457 WIDE AREA NETWORKS AND THE
INTERNET, 457 NETWORK ARCHITECTURE, 459 HOST SECURITY, 460 INCIDENTS,
460 TOOLS, 461 A FINAL WORD, 462 10.4 RISKANALYSIS 462 REASONS TO
PERFORM A RISKANALYSIS, 463 STEPS OFA RISKANALYSIS, 463 ARGUMENTS
AGAINST RISKANALYSIS, 470 SUMMARY OFBENEFITS OF RISKANALYSIS, 471 10.5
SECURITY PLANNING 471 CREATING A SECURITY PLAN, 472 CONTENT OFA SECURITY
PLAN, 472 SECURITY PLANNING TEAM MEMBERS, 474 SECURING COMMITMENT TO A
SECURITY PLAN, 475 10.6 ORGANIZATIONAL SECURITY POLICIES 475 PURPOSE,
475 ATTRIBUTES, 476 EXAMPLES, 478 10.7 DISASTER RECOVERY 479 PENIS, 480
NATURAL DISASTERS, 480 POWER LOSS, 482 HEAT, 483 CONTINGENCY PLANNING,
483 INTRUDERS, 485 DISPOSAL OF SENSITIVE MEDIA, 487 10.8 SUMMARY OF
ADMINISTERING SECURITY 489 10.9 BIBLIOGRAPHIE NOTES 489 10.10 TERMS AND
CONCEPTS 489 10.11 EXERCISES 490 11 LEGAL AND ETHICAL ISSUES IN COMPUTER
SECURITY 492 11.1 PROTECTING PROGRAMS AND DATA 494 COPYRIGHTS, 494
PATENTS, 497 TRADE SECRET, 499 PROTECTION FOR COMPUTER OBJECTS, 501
CONTENTS XIII 11.2 INFORMATION AND THE LAW 503 INFORMATION AS AN OBJECT,
503 LEGAL ISSUES RELATING TO INFORMATION, 505 11.3 RIGHTS OF EMPLOYEES
AND EMPLOYERS 506 OWNERSHIP OF PRODUCTS, 506 11.4 COMPUTER CRIME 509 WHY
A SEPARATE CATEGORYFOR COMPUTER CRIME? 509 WHY COMPUTER CRIME LS HARD TO
DEFINE, 511 WHY COMPUTER CRIME LS HARD TO PROSECUTE, 511 EXAMPLES OF
STATUTES, 512 U.S. FEDERAL STATUTES RELATED TO COMPUTING, 513 WHAT
COMPUTER CRIME DOES NOT ADDRESS, 514 CRYPTOGRAPHY AND THE LAW, 515
SUMMARY OF LEGAL ISSUES IN COMPUTER SECURITY, 516 11.5 ETHICAL ISSUES IN
COMPUTER SECURITY 517 THE LAW AND ETHICS ARE NOT THE SAME, 517 STUDYING
ETHICS, 518 ETHICAL REASONING, 520 11.6 ELECTRONIC PRIVACY 522 PRIVACY
OF ELECTRONIC DATA, 522 USE OF ENCRYPTION, 523 CRYPTOGRAPHIC KEY ESCROW,
524 11.7 CASE STUDIES OF ETHICS 524 CASEL: USE OF COMPUTER SERVICES, 524
CASE II: PRIVACY RIGHTS, 525 CASE III: DENIAL OF SERVICE, 526 CASE IV:
OWNERSHIP OFPROGRAMS, 527 CASE V: PROPRIETARY RESOURCES, 529 CASE VI:
FRAUD, 530 CASE VII: ACCURACY OF INFORMATION, 531 11.8 CODES OF ETHICS
532 IEEE, 532 ACM, 532 COMPUTER ETHICS INSTITUTE, 532 11.9 CONCLUSION
532 11.10 BIBLIOGRAPHIE NOTES 535 11.11 TERMS AND CONCEPTS 536
BIBLIOGRAPHY 537 INDEX 561
|
any_adam_object | 1 |
author | Pfleeger, Charles P. |
author_facet | Pfleeger, Charles P. |
author_role | aut |
author_sort | Pfleeger, Charles P. |
author_variant | c p p cp cpp |
building | Verbundindex |
bvnumber | BV011142308 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)35096116 (DE-599)BVBBV011142308 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03123nam a2200577 c 4500</leader><controlfield tag="001">BV011142308</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060302 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">970113s1997 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133374866</subfield><subfield code="9">0-13-337486-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)35096116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV011142308</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pfleeger, Charles P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in computing</subfield><subfield code="c">Charles P. Pfleeger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, NJ</subfield><subfield code="b">Prentice-Hall</subfield><subfield code="c">1997</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 574 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Droit à la vie privée</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacía, Derecho de</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Procesamiento electrónico de datos - Medidas de seguridad</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007467857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007467857</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV011142308 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:04:41Z |
institution | BVB |
isbn | 0133374866 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007467857 |
oclc_num | 35096116 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-29T DE-706 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-29T DE-706 DE-188 |
physical | XVIII, 574 S. Ill., graph. Darst. |
publishDate | 1997 |
publishDateSearch | 1997 |
publishDateSort | 1997 |
publisher | Prentice-Hall |
record_format | marc |
spelling | Pfleeger, Charles P. Verfasser aut Security in computing Charles P. Pfleeger 2. ed. Upper Saddle River, NJ Prentice-Hall 1997 XVIII, 574 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired. Beveiliging gtt Computers gtt Droit à la vie privée Privacía, Derecho de Procesamiento electrónico de datos - Medidas de seguridad Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Privacy, Right of Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datenschutz (DE-588)4011134-9 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007467857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Pfleeger, Charles P. Security in computing Beveiliging gtt Computers gtt Droit à la vie privée Privacía, Derecho de Procesamiento electrónico de datos - Medidas de seguridad Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Privacy, Right of Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4011144-1 |
title | Security in computing |
title_auth | Security in computing |
title_exact_search | Security in computing |
title_full | Security in computing Charles P. Pfleeger |
title_fullStr | Security in computing Charles P. Pfleeger |
title_full_unstemmed | Security in computing Charles P. Pfleeger |
title_short | Security in computing |
title_sort | security in computing |
topic | Beveiliging gtt Computers gtt Droit à la vie privée Privacía, Derecho de Procesamiento electrónico de datos - Medidas de seguridad Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Privacy, Right of Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Beveiliging Computers Droit à la vie privée Privacía, Derecho de Procesamiento electrónico de datos - Medidas de seguridad Protection de l'information (Informatique) Sécurité informatique Computer security Data protection Privacy, Right of Datenschutz Computersicherheit Rechnernetz Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007467857&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pfleegercharlesp securityincomputing |