skip to main content
Skip header Section
Computer Security: Principles and PracticeAugust 2007
Publisher:
  • Prentice Hall Press
  • One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-600424-0
Published:12 August 2007
Pages:
880
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

For courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically -- and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association have named Computer Security: Principles and Practice the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008. Visit Stallings Companion Website at http://williamstallings.com/CompSec/CompSec1e.html for student and instructor resources and his Computer Science Student Resource site http://williamstallings.com/StudentSupport.html Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required) Supplements Include: *Power Point Lecture Slides*Instructor's Manual*Author maintained website .

Cited By

  1. ACM
    Meneguette R, De Grande R, Ueyama J, Filho G and Madeira E (2021). Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges, ACM Computing Surveys, 55:1, (1-46), Online publication date: 31-Jan-2023.
  2. Chalé M and Bastian N Challenges and opportunities for generative methods in the cyber domain Proceedings of the Winter Simulation Conference, (1-12)
  3. Barbosa R, Cerveira F, Gonçalo L and Madeira H (2019). Emulating representative software vulnerabilities using field data, Computing, 101:2, (119-138), Online publication date: 1-Feb-2019.
  4. Raspotnig C, Karpati P and Opdahl A (2018). Combined Assessment of Software Safety and Security Requirements, Journal of Cases on Information Technology, 20:1, (46-69), Online publication date: 1-Jan-2018.
  5. Barman S, Chattopadhyay S, Samanta D and Panchal G (2017). A novel secure key-exchange protocol using biometrics of the sender and receiver, Computers and Electrical Engineering, 64:C, (65-82), Online publication date: 1-Nov-2017.
  6. Kevric J, Jukic S and Subasi A (2017). An effective combining classifier approach using tree algorithms for network intrusion detection, Neural Computing and Applications, 28:1, (1051-1058), Online publication date: 1-Jan-2017.
  7. ACM
    Munari S, Palazzi C, Quadrio G and Ronzani D Network Traffic Analysis of a Small Quadcopter Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, (31-36)
  8. Hwang G and Fu S Proof of violation for trust and accountability of cloud database systems Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (425-433)
  9. Zineddine M (2015). Vulnerabilities and mitigation techniques toning in the cloud, Computers and Security, 48:C, (1-18), Online publication date: 1-Feb-2015.
  10. Zulkefli Z, Singh M and Malim N Advanced Persistent Threat Mitigation Using Multi Level Security --- Access Control Framework Proceedings, Part IV, of the 15th International Conference on Computational Science and Its Applications -- ICCSA 2015 - Volume 9158, (90-105)
  11. ACM
    Konigsmark S, Hwang L, Chen D and Wong M System-of-PUFs Proceedings of the 2014 International Conference on Hardware/Software Codesign and System Synthesis, (1-10)
  12. Menon V and Rivero M (2013). Developing an iPhone app for a more safe and secure encrypted conversation/text/chat, Journal of Computing Sciences in Colleges, 28:4, (75-80), Online publication date: 1-Apr-2013.
  13. Whelan R, Leek T and Kaeli D Architecture-Independent dynamic information flow tracking Proceedings of the 22nd international conference on Compiler Construction, (144-163)
  14. Baig Z (2012). Review, Journal of Network and Computer Applications, 35:3, (1151-1161), Online publication date: 1-May-2012.
  15. Kathirvel A and Srinivasan R (2011). ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks, International Journal of Communication Networks and Distributed Systems, 7:1/2, (153-187), Online publication date: 1-Jun-2011.
  16. Chowdhury Z, Pishva D and Nishantha G AES and confidentiality from the inside out Proceedings of the 12th international conference on Advanced communication technology, (1587-1591)
  17. Warner J, Musielewicz D, Masters G, Verett T, Winchester R and Fulton S (2010). Network firewall visualization in the classroom, Journal of Computing Sciences in Colleges, 26:2, (88-96), Online publication date: 1-Dec-2010.
  18. Crenshaw T and Beyer S UPBOT Proceedings of the 3rd international conference on Cyber security experimentation and test, (1-8)
  19. Argyropoulos S, Tzovaras D, Ioannidis D, Damousis Y, Strintzis M, Braun M and Boverie S (2010). Biometric template protection in multimodal authentication systems based on error correcting codes, Journal of Computer Security, 18:1, (161-185), Online publication date: 1-Jan-2010.
  20. ACM
    Bartsch S A calculus for the qualitative risk assessment of policy override authorization Proceedings of the 3rd international conference on Security of information and networks, (62-70)
  21. ACM
    McDaniel J and Siraj A Towards a secure Frequency Monitoring NETwork (FNET) system Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  22. Lee S, Moon K and Kim J Implementation of H.264 transcoding & selective encryption of bit stream Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3, (1725-1728)
  23. Argyropoulos S, Tzovaras D, Ioannidis D and Strintzis M (2009). A channel coding approach for human authentication from gait sequences, IEEE Transactions on Information Forensics and Security, 4:3, (428-440), Online publication date: 1-Sep-2009.
  24. Tsai C, Hsu Y, Lin C and Lin W (2009). Review, Expert Systems with Applications: An International Journal, 36:10, (11994-12000), Online publication date: 1-Dec-2009.
  25. ACM
    Sukarno P, Bhattacharjee N and Srinivasan B An effective crypto-biometric system for secure email in wireless environment Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia, (241-245)
  26. Bojkovic Z, Bakmaz B and Bakmaz M Some security trends over wireless sensor networks Proceedings of the 12th WSEAS international conference on Communications, (470-474)
  27. McKinnon A, Bakken D and Shovic J (2004). A configurable cryptography subsystem in a middleware framework for embedded systems, Computer Networks: The International Journal of Computer and Telecommunications Networking, 46:6, (771-795), Online publication date: 1-Dec-2004.
Contributors
  • The U.S. Military Academy at West Point
  • University of New South Wales at Australian Defence Force Academy

Recommendations