Introduction to computer and network security : navigating shades of gray /: navigating shades of gray. (2013)
- Record Type:
- Book
- Title:
- Introduction to computer and network security : navigating shades of gray /: navigating shades of gray. (2013)
- Main Title:
- Introduction to computer and network security : navigating shades of gray
- Further Information:
- Note: Richard R. Brooks, Clemson University, South Carolina, USA.
- Other Names:
- Brooks, R. R (Richard R.)
- Contents:
- Brief History of Computers, Communications, and Security; Pre-Renaissance; Renaissance to World War I; World War I; World War II; Cold War; Organized Crime and Botnets; Cyberwar Security and Privacy Overview; Security Attributes; Social Engineering; Authentication and Authorization; Access Permissions; Audit; User Interface Issues; On Trusting Trust; Taxonomy of Attacks; Case Study—Mobile Code; Case Study—Connected Vehicles Cryptography Primer; Substitution Ciphers and Frequency Analysis; Vignère Cipher and Cryptanalysis; Block Ciphers; RSA Public Key Cryptography; Hash Functions; One-Time Pads; Key Management; Message Confidentiality; Steganography; Obfuscation and Homomorphic Encryption SSL/TLS—Case Study Project; Cryptographic Protocol; Verification; DNS and Routing; X.509 and SSL Certificates; Security Flaws With Certificates; Man-in-the-Middle Attacks; Implementation Flaws; Usability Securing Networks; Firewalls; Virtual Private Networks (VPNs); Wireless Security; Intrusion Detection Systems (IDS); Denial of Service Virtual Private Network—Case Study Project; Laboratory Preparation; Assignment; Virtual Machine (VM) Use; Sniffer Use; VPN Installation Insertion Attacks; SQL Injection; Buffer Overflow Attack; Printer Format Vulnerability; SSH Insertion Attacks; IDS Insertion Attacks; Viruses; Worms; Virus and Worm Propagation Buffer Overflow—Case Study Project; Stack Smashing; Heap Smashing; Arc Injection; Pointer Clobbering; Countermeasures Polymorphic Virus—Advanced CaseBrief History of Computers, Communications, and Security; Pre-Renaissance; Renaissance to World War I; World War I; World War II; Cold War; Organized Crime and Botnets; Cyberwar Security and Privacy Overview; Security Attributes; Social Engineering; Authentication and Authorization; Access Permissions; Audit; User Interface Issues; On Trusting Trust; Taxonomy of Attacks; Case Study—Mobile Code; Case Study—Connected Vehicles Cryptography Primer; Substitution Ciphers and Frequency Analysis; Vignère Cipher and Cryptanalysis; Block Ciphers; RSA Public Key Cryptography; Hash Functions; One-Time Pads; Key Management; Message Confidentiality; Steganography; Obfuscation and Homomorphic Encryption SSL/TLS—Case Study Project; Cryptographic Protocol; Verification; DNS and Routing; X.509 and SSL Certificates; Security Flaws With Certificates; Man-in-the-Middle Attacks; Implementation Flaws; Usability Securing Networks; Firewalls; Virtual Private Networks (VPNs); Wireless Security; Intrusion Detection Systems (IDS); Denial of Service Virtual Private Network—Case Study Project; Laboratory Preparation; Assignment; Virtual Machine (VM) Use; Sniffer Use; VPN Installation Insertion Attacks; SQL Injection; Buffer Overflow Attack; Printer Format Vulnerability; SSH Insertion Attacks; IDS Insertion Attacks; Viruses; Worms; Virus and Worm Propagation Buffer Overflow—Case Study Project; Stack Smashing; Heap Smashing; Arc Injection; Pointer Clobbering; Countermeasures Polymorphic Virus—Advanced Case Study Project; Virus Basics; Antivirus; Pseudovirus with Alternate Data Streams; Simple Virus—Timid; Infection Spreading; Self-Modifying Code; Simple Polymorphism; Packing and Encryption; Frankenstein Viruses Web Security; Cross Site Scripting (XSS); Cross Site Request Forgery (XSRF, CSRF); Man-in-the-Browser; Penetration Testing Privacy and Anonymity; Anonymity Metrics; Anonymity Tools; Computer Forensics Tools; Privacy Laws; Privacy Discussion Assignments—Antonin Scalia Side-Channel Attacks; Power Analysis; Traffic Analysis; Time Analysis; Red-Black Separation; Side-Channel Countermeasures Digital Rights Management and Copyright; Copyright History; Fair Use; Creative Commons; Digital Rights Management; Digital Millennium Copyright Act; The Darknet; Patent Trolls; Discussion Assignment—Business Case for DRM; Discussion Assignment—Technical Case for DRM Security Economics; Liability and EULAs; Network Externalities; Code Bloat; Lemon Markets; Software Engineering; Macroeconomics and Game Theory Introduction Conclusions Bibliography Index Problems and a Glossary appear at the end of each chapter. … (more)
- Publisher Details:
- Place of publication not identified : Chapman and Hall/CRC
- Publication Date:
- 2013
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.8
Computer security
Computer networks -- Security measures
Data protection
Data encryption (Computer science)
COMPUTERS / Security / General
COMPUTERS / Security / Cryptography - Languages:
- English
- ISBNs:
- 9781482214123
1482214121 - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.143806
- Ingest File:
- 02_016.xml