""I believe" The Craft of System Security "is one of the best
software security books on the market today. It has not only
breadth, but depth, covering topics ranging from cryptography,
networking, and operating systems--to the Web, computer-human
interaction, and how to improve the security of software systems by
improving hardware. Bottom line, this book should be required
reading for all who plan to call themselves security practitioners,
and an invaluable part of every university's computer science
curriculum.""
--Edward Bonver, CISSP, Senior Software QA Engineer, Product
Security, Symantec Corporation
""Here's to a fun, exciting read: a unique book chock-full of
practical examples of the uses and the misuses of computer
security. I expect that it will motivate a good number of college
students to want to learn more about the field, at the same time
that it will satisfy the more experienced professional.""
--L. Felipe Perrone, Department of Computer Science, Bucknell
University
Whether you're a security practitioner, developer, manager, or
administrator, this book will give you the deep understanding
necessary to meet today's security challenges--and anticipate
tomorrow's. Unlike most books, "The Craft of System Security"
doesn't just review the modern security practitioner's toolkit: It
explains why each tool exists, and discusses how to use it to solve
real problems.
After quickly reviewing the history of computer security, the
authors move on to discuss the modern landscape, showing how
security challenges and responses have evolved, and offering a
coherent framework for understanding today's systems and
vulnerabilities. Next, they systematically introduce thebasic
building blocks for securing contemporary systems, apply those
building blocks to today's applications, and consider important
emerging trends such as hardware-based security.
After reading this book, you will be able toUnderstand the
classic Orange Book approach to security, and its limitations Use
operating system security tools and structures--with examples from
Windows, Linux, BSD, and SolarisLearn how networking, the Web, and
wireless technologies affect securityIdentify software security
defects, from buffer overflows to development process
flawsUnderstand cryptographic primitives and their use in secure
systemsUse best practice techniques for authenticating people and
computer systems in diverse settingsUse validation, standards, and
testing to enhance confidence in a system's securityDiscover the
security, privacy, and trust issues arising from desktop
productivity toolsUnderstand digital rights management,
watermarking, information hiding, and policy expressionLearn
principles of human-computer interaction (HCI) design for improved
securityUnderstand the potential of emerging work in hardware-based
security and trusted computing
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!