Go to All Subject -

Computer Sotware and Inormation Technology Engineering CSE IT

Information Management - IT6701

Information Management

DATABASE MODELLING and MANAGEMENT AND DEVELOPMENT

DATA SECURITY AND PRIVACY

INFORMATION GOVERNANCE

INFORMATION ARCHITECTURE

INFORMATION LIFECYCLE MANAGEMENT

Security in Computing By Charles P Pfleeger

Chapter 1 Is There a Security Problem in Computing


-:- What Does "Secure" Mean?
-:- Protecting Software in Automobile Control Systems
-:- Attacks
-:- Why Universities Are Prime Targets
-:- The Meaning of Computer Security
-:- Record Record Loss
-:- Top Methods of Attack
-:- Computer Criminals
-:- The Terrorists, Inc., IT Department
-:- Methods of Defense

Chapter 2 Elementary Cryptography


-:- Elementary Cryptography
-:- Elementary Cryptography - Terminology and Background
-:- Substitution Ciphers
-:- Transpositions (Permutations)
-:- Making "Good" Encryption Algorithms
-:- The Data Encryption Standard(DES)
-:- The AES Encryption Algorithm
-:- Public Key Encryption
-:- The Uses of Encryption

Chapter 3 Program Security


-:- Program Security
-:- Secure Programs
-:- Nonmalicious Program Errors
-:- Viruses and Other Malicious Code
-:- Nonmalicious Flaws Cause Failures
-:- Why Worry About Malicious Code?
-:- Kinds of Malicious Code
-:- Rapidly Approaching Zero
-:- How Viruses Attach
-:- How Viruses Gain Control
-:- Homes for Viruses
-:- Virus Signatures
-:- The Source of Viruses
-:- Prevention of Virus Infection
-:- Truths and Misconceptions About Viruses
-:- First Example of Malicious Code: The Brain Virus
-:- Example: The Internet Worm
-:- More Malicious Code: Code Red
-:- Malicious Code on the Web: Web Bugs
-:- Is the Cure Worse Than the Disease?
-:- Trapdoors - Targeted Malicious Code: Examples, Causes
-:- Salami Attack
-:- Rootkits and the Sony XCP
-:- Privilege Escalation
-:- Interface Illusions
-:- Keystroke Logging
-:- Man-in-the-Middle Attacks
-:- Timing Attacks
-:- Covert Channels: Programs That Leak Information
-:- Controls Against Program Threats
-:- The Nature of Software Development
-:- Modularity, Encapsulation, and Information Hiding
-:- Peer Reviews
-:- Hazard Analysis
-:- Testing
-:- Good Design and Prediction
-:- Static Analysis
-:- Configuration Management
-:- Lessons from Mistakes
-:- There's More Than One Way to Crack a System
-:- Formal Methods Can Catch Difficult-to-See Problems
-:- Programming Practice Conclusions
-:- Standards of Program Development
-:- Process Standards
-:- Program Controls in General

Chapter 4 Protection in General Purpose Operating Systems


-:- Protection in General-Purpose Operating Systems
-:- Protected Objects and Methods of Protection
-:- Memory and Address Protection
-:- Control of Access to General Objects
-:- File Protection Mechanisms
-:- User Authentication
-:- Biometrics: Ready for Prime Time?
-:- Passwords as Authenticators
-:- Additional Authentication Information
-:- Attacks on Passwords
-:- Password Selection Criteria
-:- The Authentication Process
-:- Biometrics: Authentication Not Using Passwords

Chapter 5 Designing Trusted Operating Systems


-:- Designing Trusted Operating Systems
-:- What Is a Trusted System?
-:- Security Policies
-:- Models of Security
-:- Trusted Operating System Design
-:- The Importance of Good Design Principles
-:- Trusted System Design Elements
-:- Security Features of Ordinary Operating Systems
-:- Security Features of Trusted Operating Systems
-:- Kernelized Design
-:- Separation/Isolation
-:- Virtualization
-:- Layered Design
-:- Assurance in Trusted Operating Systems
-:- Typical Operating System Flaws
-:- Assurance Methods
-:- Open Source
-:- Evaluation
-:- Security as an Add-On

Chapter 6 Database and Data Mining Security


-:- Database and Data Mining Security
-:- Introduction to Databases
-:- Security Requirements
-:- Reliability and Integrity
-:- Sensitive Data
-:- Inference
-:- Multilevel Databases
-:- Proposals for Multilevel Security
-:- Data Mining

Chapter 7 Security in Networks


-:- Security in Networks
-:- Network Concepts
-:- Network Media
-:- Network Protocols
-:- Types of Networks
-:- Threats in Networks
-:- Who Attacks Networks?
-:- Threats in Transit: Eavesdropping and Wiretapping
-:- Protocol Flaws
-:- Impersonation
-:- Message Confidentiality Threats
-:- Message Integrity Threats
-:- Format Failures
-:- Web Site Vulnerabilities
-:- Denial of Service
-:- Distributed Denial of Service
-:- Threats in Active or Mobile Code
-:- Threats in Active or Mobile Code
-:- Networks Complex Attacks
-:- Network Security Controls - Security Threat Analysis
-:- Architecture - Security in Networks
-:- Encryption - Security in Networks
-:- Content Integrity - Security in Networks
-:- Strong Authentication and Kerberos - Security in Networks
-:- Access Controls - Security in Networks
-:- Wireless Networks Security
-:- Honeypots, Alarms and Alerts - Security in Networks
-:- Traffic Flow Security
-:- Firewalls
-:- Types of Firewalls
-:- Example Firewall Configurations
-:- Intrusion Detection Systems
-:- Types of IDSs(Intrusion Detection Systems)
-:- Goals for Intrusion Detection Systems
-:- Intrusion Detection Systems(IDS) Strengths and Limitations
-:- Secure E-Mail

Chapter 8 Administering Security


-:- Administering Security
-:- Security Planning
-:- Contents of a Security Plan
-:- Security Planning Team Members
-:- Assuring Commitment to a Security Plan
-:- Business Continuity Plans
-:- Incident Response Plans
-:- Risk Analysis
-:- The Nature of Risk
-:- Steps of a Risk Analysis
-:- Arguments For and Against Risk Analysis
-:- Organizational Security Policies
-:- Characteristics of a Good Security Policy
-:- Policy Issue Example: Government E-mail
-:- Physical Security
-:- Interception of Sensitive Information
-:- Contingency Planning
-:- Physical Security Recap

Chapter 9 The Economics of Cybersecurity


-:- The Economics of Cybersecurity
-:- Making a Business Case
-:- Quantifying Security
-:- The Economic Impact of Cybersecurity
-:- Data to Justify Security Action
-:- A Summary of Recent Security Surveys
-:- Are the Data Representative?
-:- Sources of Attack and Financial Impact
-:- Modeling Cybersecurity
-:- Current Research and Future Directions

Chapter 10 Privacy in Computing


-:- Privacy in Computing
-:- Privacy Concepts
-:- Computer-Related Privacy Problems
-:- Privacy Principles and Policies
-:- Authentication and Privacy
-:- What Authentication Means
-:- Data Mining
-:- Privacy on the Web
-:- Spyware
-:- Shopping on the Internet
-:- E-Mail Security
-:- Impacts on Emerging Technologies

Chapter 11 Legal and Ethical Issues in Computer Security


-:- Legal and Ethical Issues in Computer Security
-:- Protecting Programs and Data
-:- Copyrights - Protecting Programs and Data
-:- Patents - Protecting Programs and Data
-:- Trade Secrets
-:- Protection for Computer Objects
-:- Information and the Law
-:- Rights of Employees and Employers
-:- Redress for Software Failures
-:- Computer Crime
-:- Why Computer Crime Is Hard to Define and Prosecute
-:- Examples of Statutes
-:- International Dimensions
-:- Why Computer Criminals Are Hard to Catch
-:- What Computer Crime Does Not Address
-:- Cryptography and the Law
-:- Ethical Issues in Computer Security
-:- Case Studies of Ethics: Use of Computer Services
-:- Case Studies of Ethics: Privacy Rights
-:- Case Studies of Ethics: Denial of Service
-:- Case Studies of Ethics: Ownership of Programs
-:- Case Studies of Ethics: Proprietary Resources
-:- Case Studies of Ethics: Fraud
-:- Case Studies of Ethics: Accuracy of Information
-:- Case Studies of Ethics: Ethics of Hacking or Cracking
-:- Codes of Computer Ethics

Chapter 12 Cryptography Explained


-:- Cryptography Explained
-:- Mathematics for Cryptography
-:- Symmetric Encryption
-:- Data Encryption Standard
-:- Advanced Encryption Standard
-:- Public Key Encryption Systems
-:- MerkleHellman Knapsacks
-:- RivestShamirAdelman (RSA) Encryption
-:- The El Gamal and Digital Signature Algorithms
-:- Quantum Cryptography

Information Architecture on the World Wide Web by Peter Morville

Chapter 1 What Makes a Web Site Work


-:- What Makes a Web Site Work
-:- Consumer Sensitivity Boot Camp
-:- Web Site Work - If You Don't Like to Exercise
-:- The Role of the Information Architect

Chapter 2 Introduction to Information Architecture


-:- Who Should Be the Information Architect?
-:- Collaboration and Communication
-:- Organizing Information

Chapter 3 Organizing Information


-:- Organizing Information
-:- Organizational Challenges
-:- Organizing Web Sites and Intranets
-:- Creating Cohesive Organization Systems
-:- Designing Navigation Systems

Chapter 4 Designing Navigation Systems


-:- Designing Navigation Systems
-:- Browser Navigation Features
-:- Building Context
-:- Improving Flexibility
-:- Types of Navigation Systems
-:- Integrated Navigation Elements
-:- Remote Navigation Elements
-:- Designing Elegant Navigation Systems
-:- Labeling Systems

Chapter 5 Labeling Systems


-:- Labeling Systems
-:- Why You Should Care About Labeling
-:- Labeling Systems, Not Labels
-:- Types of Labeling Systems
-:- Creating Effective Labeling Systems
-:- Fine-Tuning the Labeling System
-:- Non-Representational Labeling Systems
-:- A Double Challenge - Labeling Systems
-:- Searching and Your Web Site

Chapter 6 Searching Systems


-:- Searching and Your Web Site
-:- Understanding How Users Search
-:- Designing the Search Interface
-:- In an Ideal World: The Reference Interview
-:- Indexing the Right Stuff
-:- To Search or Not To Search?
-:- Research

Chapter 7 Research


-:- Research
-:- Research: Defining Goals
-:- Learning About the Intended Audiences
-:- Identifying Content and Function Requirements
-:- Grouping Content
-:- Conceptual Design

Chapter 8 Conceptual Design


-:- Conceptual Design
-:- Brainstorming with White Boards and Flip Charts
-:- Metaphor Exploration
-:- High-Level Architecture Blueprints
-:- Architectural Page Mockups
-:- Design Sketches
-:- Web-Based Prototypes
-:- Production and Operations

Chapter 9 Production and Operations


-:- Production and Operations
-:- Detailed Architecture Blueprints
-:- Content Mapping
-:- Web Page Inventory
-:- Point-of-Production Architecture
-:- Architecture Style Guides
-:- Learning from Users
-:- Information Architecture in Action

Chapter 10 Information Architecture in Action


-:- Information Architecture in Action
-:- Archipelagoes of Information
-:- A Case Study: Henry Ford Health System
Mahendra Varman Mahendra Varman Mahendra Varman Mahendra Varman Mahendra Varman

​ReadOrRefer.in