Synopses & Reviews
Today, security is no longer only a topic of interest for specialists, but a concern for all end users, systems administrators, and software developers.
The development of new kinds of IT applications means that unique security threats continue to emerge. These new challenges may require novel solutions, and traditional security solutions can actually exacerbate the problem rather than solve it.
Dieter Gollmann's popular text continues to offer a comprehensive yet concise overview of the subject that will help the reader think about security at every level. Beginning with basic definitions and concepts and going on to outline the mechanisms at the heart of the computer system, this book covers security issues in networks, operating systems and databases, and shows how to evaluate and tackle security problems.
Updated throughout, the second edition includes brand new chapters on software security, authentication in distributed systems, new paradigms in access control, and mobility. Also included are brief introductions to security management and cryptography.
Computer Securityis essential reading for undergraduate and postgraduate students on a variety of introductory and advanced security courses in computer science, engineering and related disciplines. Technical and project managers will also find that this book offers a great starting point for dealing with complex security challenges.
Designed for use on courses or self study, additional resources such as lecture slides and suggested solutions to end of chapter exercises can be found at www.wiley.com/go/gollmann
Comments on the first edition
"...a very useful book for those involved in the thorny issues of Computer Security. I recommend it to my students."
—Antonia Jones, Cardiff University
More comments on the first edition
"...highly readable and contains clear explanations and examples.... I found myself wishing I had had this book when I started working in this area."
—N. R. Mead, New York Review
"...an excellent textbook either for higher education or for advanced training programmes on computer security."
—Jianying Zhou, Computer Communications
"...the book I have been looking for for years..."
—Viiveke Fak, Linkoping University
"Mandatory reading for aspiring system managers"
—Antonia Jones, Cardiff University
Review
"Obviously, it is an excellent textbook either for high education or for advanced training programme on computer security.", Jianying Zhou, , Computer Communications 25/8/99#
Synopsis
This is a brand new edition of the best-selling computer security book. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.
- Comprehensive reference covering fundamental principles of computer security
- Thinking about security within the initial design of a system is a theme that runs through the book
- A top-down approach.
- No active previous experience of security issues is necessary making this accessible to Software Developers and Managers whose responsibilities span any technical aspects of IT security
- Provides sections on Windows NT, CORBA and Java
Synopsis
Computer Security .... the book I have been looking for for years .... Viiveke F?k, Link?ping University A comprehensive and practical text and the perfect starting point for this subject. 'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as:
* Should protection focus on data, operations or users?
* Whilst taking cast iron measures to build in security at one level, what does one do to prevent attackers gaining entry from a lower level?
Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. It meets a real need for a comprehensive textbook on the subject. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems. Instructors' resources are available at: http://isg.rhbnc.ac.uk/TM.htm Visit our Website at: www.wiley.com/compbooks/
Synopsis
A comprehensive and practical text and the perfect starting point for this subject ... 'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as: * Should protection focus on data, operations or users? * Whilst taking cast iron measures to build in security at one level, what does one do to prevent attackers gaining entry from a lower level?
Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings.
Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. It meets a real need for a comprehensive textbook on the subject. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.
About the Author
Dieter Gollmannis Professor for Security in Distributed Applications at Hamburg University of Technology. He is also a visiting Professor at Royal Holloway, University of London and Adjunct Professor at the Technical University of Denmark. Previously he was a researcher in Information Security at Microsoft Research in Cambridge.
Table of Contents
Fundamentals.
Access Control.
Security Models.
Microprocessors.
Operating Systems (Including Case Studies).
Networks Security.
Distributed System Security.
Security APIs.
Database Security.
Security Evaluation.
Attacks (Including Viruses).