

Webcasts for teaching computer security: A catalog of webcast sites that can be used to enhance the course.Writing assignments: A list of writing assignments to facilitate learning the material.Reading/report assignments: A list of papers that can be assigned for reading and writing a report, plus suggested assignment wording.Case studies: A set of real-world case studies, including learning objectives, case description, and a series of case discussion questions.Firewall projects: A portable network firewall visualization simulator is provided, together with exercises for teaching the fundamentals of firewalls.Practical security assessments: A set of exercises to examine current infrastructure and practices of an existing organization.Programming projects: A series of programming projects that cover a broad range of topics and that can be implemented in any suitable language on any platform.


Real-world examples: A number of chapters include a section that shows the practical application of that chapter’s principles in a real-world environment.An understanding of the current status and future direction of technology requires a comprehensive discussion of the related standards. Standards: Standards have come to assume an increasingly important, indeed dominant, role in this field.Design approaches: The book examines alternative approaches to meeting specific computer security requirements.The book highlights these principles and examines their application in specific areas of computer security. Principles: Although the scope of this book is broad, there are a number of basic principles that appear repeatedly as themes and that unify this field, for example, authentication and access control.The content in the book is unified by four basic themes.Capture the most recent changes in the field while maintaining a broad and comprehensive coverage of the entire field.Current developments and topics in computer and network security
