Book description
Combining hands-on work with an overview of fundamentals, this text integrates security analysis into a technical computing curriculum. It educates students on security issues, such as side-channel attacks, and deepens their understanding of how computers and networks work. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Classroom-tested case study projects prompt students to stage exploits and choose countermeasures to neutralize the attacks.
Table of contents
- Front Cover
- Dedication
- Contents (1/2)
- Contents (2/2)
- List of Figures
- List of Tables
- Foreword
- About the Author
- Acknowledgments
- Preface
- 1. Brief History of Computers, Communications, and Security (1/5)
- 1. Brief History of Computers, Communications, and Security (2/5)
- 1. Brief History of Computers, Communications, and Security (3/5)
- 1. Brief History of Computers, Communications, and Security (4/5)
- 1. Brief History of Computers, Communications, and Security (5/5)
- 2. Security and Privacy Overview (1/10)
- 2. Security and Privacy Overview (2/10)
- 2. Security and Privacy Overview (3/10)
- 2. Security and Privacy Overview (4/10)
- 2. Security and Privacy Overview (5/10)
- 2. Security and Privacy Overview (6/10)
- 2. Security and Privacy Overview (7/10)
- 2. Security and Privacy Overview (8/10)
- 2. Security and Privacy Overview (9/10)
- 2. Security and Privacy Overview (10/10)
- 3. Cryptography Primer (1/6)
- 3. Cryptography Primer (2/6)
- 3. Cryptography Primer (3/6)
- 3. Cryptography Primer (4/6)
- 3. Cryptography Primer (5/6)
- 3. Cryptography Primer (6/6)
- 4. SSL/TLS – Case Study Project (1/5)
- 4. SSL/TLS – Case Study Project (2/5)
- 4. SSL/TLS – Case Study Project (3/5)
- 4. SSL/TLS – Case Study Project (4/5)
- 4. SSL/TLS – Case Study Project (5/5)
- 5. Securing Networks (1/4)
- 5. Securing Networks (2/4)
- 5. Securing Networks (3/4)
- 5. Securing Networks (4/4)
- 6. Virtual Private Network – Case Study Project (1/3)
- 6. Virtual Private Network – Case Study Project (2/3)
- 6. Virtual Private Network – Case Study Project (3/3)
- 7. Insertion Attacks (1/4)
- 7. Insertion Attacks (2/4)
- 7. Insertion Attacks (3/4)
- 7. Insertion Attacks (4/4)
- 8. Buffer Overflow – Case Study Project (1/5)
- 8. Buffer Overflow – Case Study Project (2/5)
- 8. Buffer Overflow – Case Study Project (3/5)
- 8. Buffer Overflow – Case Study Project (4/5)
- 8. Buffer Overflow – Case Study Project (5/5)
- 9. Polymorphic Virus – Advanced Case Study Project (1/3)
- 9. Polymorphic Virus – Advanced Case Study Project (2/3)
- 9. Polymorphic Virus – Advanced Case Study Project (3/3)
- 10. Web Security (1/2)
- 10. Web Security (2/2)
- 11. Privacy and Anonymity (1/3)
- 11. Privacy and Anonymity (2/3)
- 11. Privacy and Anonymity (3/3)
- 12. Side-Channel Attacks (1/2)
- 12. Side-Channel Attacks (2/2)
- 13. Digital Rights Management and Copyright (1/2)
- 13. Digital Rights Management and Copyright (2/2)
- 14. Security Economics (1/2)
- 14. Security Economics (2/2)
- 15. Conclusions
- Bibliography (1/8)
- Bibliography (2/8)
- Bibliography (3/8)
- Bibliography (4/8)
- Bibliography (5/8)
- Bibliography (6/8)
- Bibliography (7/8)
- Bibliography (8/8)
Product information
- Title: Introduction to Computer and Network Security
- Author(s):
- Release date: August 2013
- Publisher(s): Chapman and Hall/CRC
- ISBN: 9781482214123
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Introduction to Network Security, 2nd Edition
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers …
book
Network Protocols for Security Professionals
Get to grips with network-based attacks and learn to defend your organization's network and network devices …
book
Computer Network Security
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an …