Includes bibliographical references (p. 267-275) and index.
Contents:
Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulation -- SQL injection -- Password security -- Cross-domain security in web applications -- Exercises for part 2 -- Pt. 3. Introduction to cryptography -- Symmetric key crytography -- Asymmetric key cryptography -- Key management and exchange -- MACs and signatures -- Exercises for part 3.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.