目录
《Computer Security Principles and Practice》
0.Reader's and Instructor's Guide
0.1 Outline of This Book
0.2 A Roadmap for Readers and Instructors
0.3 Support for CISSp Certification
0.4 Support for NSA/DHS Certification
0.5 Support for ACM/IEEE Computer Society Computer Science Curricula 2013
0.6 Internet and Web Resources
0.7 Standards
1.1 Computer Security Concepts
1.2 Threats, Attacks, and Assets
1.3 Security Functional Requirements
1.4 Fundamental Security Design Principles
1.5 Attack Surfaces and Attack Trees
1.6 Computer Security Strategy
1.7 Recommended Reading
1.8 Key Terms, Review Questions, and Problems
2.1 Confidentiality with Symmetric Encryption
2.2 Message Authentication and Hash Functions
2.3 Public-Key Encryption
2.4 Digital Signatures and Key Management
2.5 Random and Pseudorandom Numbers
2.6 Practical Application: Encryption of Stored Data
2.7 Recommended Reading
2.8 Key Terms, Review Questions, and Problems