Custom cover image
Custom cover image

Elements of Computer Security / by David Salomon

By: Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: Undergraduate Topics in Computer Science | SpringerLink BücherPublisher: London : Springer-Verlag London Limited, 2010Description: Online-Ressource (XX, 375p, digital)ISBN:
  • 9780857290069
Subject(s): Additional physical formats: 9780857290052 | Buchausg. u.d.T.: Elements of computer security. London : Springer, 2010. XIX, 374 S.DDC classification:
  • 005.8
RVK: RVK: ST 277 | ST 330LOC classification:
  • QA76.9.A25
DOI: DOI: 10.1007/978-0-85729-006-9Online resources:
Contents:
""Preface""; ""Contents""; ""Introduction""; ""1 Physical Security""; ""1.1 Side-Channel Attacks""; ""1.1.1 Acoustic Keyboard Eavesdropping""; ""1.2 Physical Threats""; ""1.3 Laptop Security""; ""1.4 Disaster Recovery Planning""; ""1.5 Privacy Protection""; ""2 Viruses""; ""2.1 Operating Systems""; ""2.2 Computer Viruses""; ""2.3 Virus Writers""; ""2.4 Virus Propagation""; ""2.5 Virus Classification""; ""2.6 Boot Sector Viruses""; ""2.7 File Infector Viruses""; ""2.8 Companion Viruses""; ""2.9 Multipartite Viruses""; ""2.10 Macro and Script Viruses""; ""2.11 Infected Images""
""2.12 Virus Life Cycle""""2.13 Viruses and UNIX""; ""2.14 Viruses and the Macintosh""; ""2.15 Virus Replication""; ""2.16 Virus Payload""; ""2.17 Virus Organization""; ""2.18 Virus Naming""; ""2.19 Virus Hiding Methods""; ""2.20 Polymorphism""; ""2.21 Virus Stealth Techniques""; ""2.22 Interrupts and Viruses""; ""2.23 Trapdoors""; ""3 Worms""; ""3.1 Code Red I""; ""3.2 Worming Techniques""; ""3.3 Proposing a CCDC""; ""3.4 The Internet Worm""; ""3.5 iPhone Worms""; ""4 Trojan Horses""; ""4.1 Applications of Trojans""; ""4.2 Installing a Trojan""; ""4.3 Rigging a Compiler""
""5 Examples of Malware""""5.1 The Lehigh Virus""; ""5.2 The Brain Virus""; ""5.3 The Michaelangelo Virus""; ""5.4 The SirCAM Virus""; ""5.5 The Melissa Virus""; ""5.6 Scores Virus""; ""5.7 Swiss Amiga Virus""; ""5.8 Christmas Card Virus""; ""5.9 VBS.KAK Worm""; ""5.10 The Cruncher Virus""; ""5.11 Opener Virus""; ""5.12 MTX Worm/Virus""; ""6 Prevention and Defense""; ""6.1 Understanding Vulnerabilities""; ""6.2 Defenses Against Malware""; ""6.3 Anti-Virus Software""; ""6.4 Backups and Such""; ""6.5 Botnets, Zombies, and Remote Control""; ""6.6 Hoaxes""; ""7 Network Security""
""7.1 Internet Vulnerabilities""""7.2 Port Scanning""; ""7.3 Spoofs""; ""7.4 Spam""; ""7.5 Denial of Service""; ""7.6 Firewall Basics""; ""7.7 Other Threats""; ""8 Authentication""; ""8.1 Local Authentication""; ""8.2 Biometric Techniques""; ""8.3 Passwords""; ""9 Spyware""; ""9.1 Introduction and Definition""; ""9.2 RIAA and Spyware""; ""9.3 Terrorism and Spyware""; ""9.3.1 Parasiteware""; ""9.4 Political Contributions""; ""9.5 Distribution of Spyware""; ""9.6 Remote Reporting""; ""9.7 Adware""; ""9.8 Spyware?""; ""9.8.1 Researchware""; ""10 Identity Theft""; ""10.1 Introduction""
""10.2 Shredding""""10.3 Internet Cookies""; ""10.4 Phishing""; ""10.5 The Homograph Threat""; ""11 Privacy and Trust""; ""11.1 Privacy Issues""; ""11.2 Online Privacy""; ""11.3 Children�s Privacy""; ""11.4 Digital Forensics""; ""11.5 Trust""; ""A The Hacker""; ""B l33t Speak""; ""C Virus Timeline""; ""Concluding Remarks""; ""Malware: Summary""; ""Final Conclusions""; ""Glossary""; ""Bibliography""; ""Index""; ""Colophon""
Summary: As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future. Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors. Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of 'l33t Speak', and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises. Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.PPN: PPN: 1650086539Package identifier: Produktsigel: ZDB-2-SCS
No physical items for this record