Amazon cover image
Image from Amazon.com
Image from Google Jackets

Elements of computer security / David Salomon.

By: Material type: TextTextSeries: Publication details: New Delhi : Springer (India), 2012.Description: xix, 374 pISBN:
  • 9788132206668
Subject(s): DDC classification:
  • 005.8 22 SAL
LOC classification:
  • QA76.9.A25 S2655 2010
  • QA76.9.A25
Contents:
1. Physical security. -- Side-channel attacks -- Physical threats -- Laptop security -- Disaster recovery planning -- Privacy protection -- 2. Viruses. -- Operating systems -- Computer viruses -- Virus writers -- Virus propagation -- Virus classification -- Boot sector viruses -- File infector viruses -- Companion viruses -- Multipartite viruses -- Macro and script viruses -- Infected images -- Virus life cycle -- Viruses and UNIX -- Viruses and the Macintosh -- Virus replication -- Virus payload -- Virus organization -- Virus naming -- Virus hiding methods -- Polymorphism -- Virus stealth techniques -- Interrupts and viruses -- Trapdoors -- 3. Worms. -- Code Red I -- Worming techniques -- Proposing a CCDC -- The internet worm -- iPhone worms -- 4. Trojan horses. -- Applications of Trojans -- Installing a Trojan -- Rigging a compiler -- 5. Examples of malware. -- The Lehigh Virus -- The Brain Virus -- The Michaelangelo Virus -- The SirCAM Virus -- The Melissa Virus -- Scores Virus -- Swiss Amiga Virus -- Christmas Card Virus -- VBS.KAK Worm -- The Cruncher Virus -- Opener Virus -- MTX Worm/Virus -- 6. Prevention and defense. -- Understanding vulnerabilities -- Defenses against malware -- Anti-Virus Software -- Backups and such -- Botnets, Zombies, and remote control -- Hoaxes -- 7. Network security. -- Internet vulnerabilities -- Port scanning -- Spoofs -- Spam -- Denial of service -- Firewall basics -- Other threats -- 8. Authentication. -- Local authentication -- Biometric techniques -- Passwords -- 9. Spyware. -- Introduction and definition -- RIAA and Spyware -- Terrorism and Spyware -- Political contributions -- Distributions of Spyware -- Remote reporting -- Adware -- Spyware? -- 10. Identity theft. -- Introduction -- Shredding -- Internet cookies -- Phishing -- The Homograph Threat -- 11. Privacy and trust. -- Privacy issues -- Online privacy -- Children's privacy -- Digital forensics -- Trust -- The Hacker -- 133t Speak -- Virus Timeline.
Summary: Examines the physical security of computer hardware, networks, and digital data. Introduces the different forms of rogue software, discusses methods for preventing and defending against them, and describes a selection of viruses, worms, and Trojans in detail. Investigates threats to network security and explores the subjects of authentication, spyware, and identity theft. Discusses key issues about privacy and trust in the online world.--
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Learning Resource Centre 005.8 SAL (Browse shelf(Opens below)) Available 9824
Total holds: 0

Includes webography.

Includes bibliographical references (pages 347-361) and index.

1. Physical security. -- Side-channel attacks -- Physical threats -- Laptop security -- Disaster recovery planning -- Privacy protection -- 2. Viruses. -- Operating systems -- Computer viruses -- Virus writers -- Virus propagation -- Virus classification -- Boot sector viruses -- File infector viruses -- Companion viruses -- Multipartite viruses -- Macro and script viruses -- Infected images -- Virus life cycle -- Viruses and UNIX -- Viruses and the Macintosh -- Virus replication -- Virus payload -- Virus organization -- Virus naming -- Virus hiding methods -- Polymorphism -- Virus stealth techniques -- Interrupts and viruses -- Trapdoors -- 3. Worms. -- Code Red I -- Worming techniques -- Proposing a CCDC -- The internet worm -- iPhone worms -- 4. Trojan horses. -- Applications of Trojans -- Installing a Trojan -- Rigging a compiler -- 5. Examples of malware. -- The Lehigh Virus -- The Brain Virus -- The Michaelangelo Virus -- The SirCAM Virus -- The Melissa Virus -- Scores Virus -- Swiss Amiga Virus -- Christmas Card Virus -- VBS.KAK Worm -- The Cruncher Virus -- Opener Virus -- MTX Worm/Virus -- 6. Prevention and defense. -- Understanding vulnerabilities -- Defenses against malware -- Anti-Virus Software -- Backups and such -- Botnets, Zombies, and remote control -- Hoaxes -- 7. Network security. -- Internet vulnerabilities -- Port scanning -- Spoofs -- Spam -- Denial of service -- Firewall basics -- Other threats -- 8. Authentication. -- Local authentication -- Biometric techniques -- Passwords -- 9. Spyware. -- Introduction and definition -- RIAA and Spyware -- Terrorism and Spyware -- Political contributions -- Distributions of Spyware -- Remote reporting -- Adware -- Spyware? -- 10. Identity theft. -- Introduction -- Shredding -- Internet cookies -- Phishing -- The Homograph Threat -- 11. Privacy and trust. -- Privacy issues -- Online privacy -- Children's privacy -- Digital forensics -- Trust -- The Hacker -- 133t Speak -- Virus Timeline.

License restrictions may limit access.

Examines the physical security of computer hardware, networks, and digital data. Introduces the different forms of rogue software, discusses methods for preventing and defending against them, and describes a selection of viruses, worms, and Trojans in detail. Investigates threats to network security and explores the subjects of authentication, spyware, and identity theft. Discusses key issues about privacy and trust in the online world.--

There are no comments on this title.

to post a comment.
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.