
Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues faced in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, explaining ways to make a business case for security investments. Another new chapter addresses privacy--from data mining and identity theft, to RFID and e-voting.
New coverage also includes
* Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks
* Web application threats and vulnerabilities
* Networks of compromised systems: bots, botnets, and drones
* Rootkits--including the notorious Sony XCP
* Wi-Fi network security challenges, standards, and techniques
* New malicious code attacks, including false interfaces and keystroke loggers
* Improving code quality: software engineering, testing, and liability approaches
* Biometric authentication: capabilities and limitations
* Using the Advanced Encryption System (AES) more effectively
* Balancing dissemination with piracy control in music and other digital content
* Countering new cryptanalytic attacks against RSA, DES, and SHA
* Responding to the emergence of organized attacker groups pursuing profit
880 pages | 2006-10-23 | CHM | 8 Mb
0 comments:
Post a Comment