
Computer System Security
Basic Concepts and Solved Exercices
- English
- PDF
- Available on iOS & Android
Computer System Security
Basic Concepts and Solved Exercices
About this book
Computer networks are the spinal cord of our civilisation; because of the huge stakes involved, universities and certain companies must now teach the basics of computer system security. The purpose of this book is to help people learn about the fundamentals of this field through the study of solved exercices. The primary goal is not to create experts in this domain, but rather to teach the concepts required to understand the risks and consequences of computer system misuse. This book thus handles the basic aspects of computer security, including e-mail; viruses and antivirus programs; program and network vulnerabilities; fire walls, address translation and filtering; cryptography; secure communications; secure applications; and security management.This work is a novel addition to the literature in that it gives, for each subject, a short summary of the main principles followed by a series of exercises (with solutions), resulting in a self-contained book that provides a solid foundation in computer security to students. Chapters in this book have been conceived to be as independent as possible. All of them, nevertheless, require a background in computer science and a familiarity with the most common network protocols.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Contents
- Foreword
- 1 Forged E-Mail and Spam
- 2 Malwares
- 3 Network and Application Vulnerabilities
- 4 Firewalls and Proxies
- 5 Cryptography
- 6 Secure Communications
- 7 Security at the User Level
- 8 Management of Information Security
- Acronyms
- References