Atjaunināt sīkdatņu piekrišanu

E-grāmata: Computer Architecture and Security - Fundamentals of Designing Secure Computer Systems: Fundamentals of Designing Secure Computer Systems [Wiley Online]

(George Mason University, U.S.A.), (George Mason University, U.S.A.)
  • Formāts: 360 pages
  • Izdošanas datums: 19-Dec-2014
  • Izdevniecība: John Wiley & Sons Inc
  • ISBN-10: 1118168852
  • ISBN-13: 9781118168851
  • Wiley Online
  • Cena: 126,30 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Formāts: 360 pages
  • Izdošanas datums: 19-Dec-2014
  • Izdevniecība: John Wiley & Sons Inc
  • ISBN-10: 1118168852
  • ISBN-13: 9781118168851
Wang (George Mason U.) and Ledley (Georgetown U.) introduce the fundamentals of computer architecture and security, covering a range of computer hardware, system software, and data concepts from a security perspective. They introduce a new model for securing computer systems that changes the traditional Neumann architecture and also cover the latest technologies, such as virtualization, cloud computing, Internet computing, and biocomputers. They make extensive use of diagrams to illustrate the material, illustrating the actual digital circuits for many key elements. Annotation ©2013 Book News, Inc., Portland, OR (booknews.com)

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates
About the Authors xv
Preface xvii
Acknowledgements xix
1 Introduction to Computer Architecture and Security
1(50)
1.1 History of Computer Systems
3(31)
1.1.1 Timeline of Computer History
5(10)
1.1.2 Timeline of Internet History
15(13)
1.1.3 Timeline of Computer Security History
28(6)
1.2 John von Neumann Computer Architecture
34(2)
1.3 Memory and Storage
36(1)
1.4 Input/Output and Network Interface
37(1)
1.5 Single CPU and Multiple CPU Systems
38(3)
1.6 Overview of Computer Security
41(5)
1.6.1 Confidentiality
41(1)
1.6.2 Integrity
42(1)
1.6.3 Availability
42(1)
1.6.4 Threats
43(1)
1.6.5 Firewalls
43(1)
1.6.6 Hacking and Attacks
44(2)
1.7 Security Problems in Neumann Architecture
46(2)
1.8 Summary
48(3)
Exercises
48(2)
References
50(1)
2 Digital Logic Design
51(17)
2.1 Concept of Logic Unit
51(1)
2.2 Logic Functions and Truth Tables
52(2)
2.3 Boolean Algebra
54(1)
2.4 Logic Circuit Design Process
55(1)
2.5 Gates and Flip-Flops
56(2)
2.6 Hardware Security
58(1)
2.7 FPGA and VLSI
58(7)
2.7.1 Design of an FPGA Biometric Security System
59(1)
2.7.2 A RIFD Student Attendance System
59(6)
2.8 Summary
65(3)
Exercises
67(1)
References
67(1)
3 Computer Memory and Storage
68(22)
3.1 A One Bit Memory Circuit
68(2)
3.2 Register, MAR, MDR and Main Memory
70(2)
3.3 Cache Memory
72(2)
3.4 Virtual Memory
74(2)
3.4.1 Paged Virtual Memory
75(1)
3.4.2 Segmented Virtual Memory
75(1)
3.5 Non-Volatile Memory
76(1)
3.6 External Memory
77(9)
3.6.1 Hard Disk Drives
78(1)
3.6.2 Tertiary Storage and Off-Line Storage
78(1)
3.6.3 Serial Advanced Technology Attachment (SATA)
79(1)
3.6.4 Small Computer System Interface (SCSI)
80(1)
3.6.5 Serial Attached SCSI (SAS)
81(1)
3.6.6 Network-Attached Storage (NAS)
82(1)
3.6.7 Storage Area Network (SAN)
83(2)
3.6.8 Cloud Storage
85(1)
3.7 Memory Access Security
86(2)
3.8 Summary
88(2)
Exercises
89(1)
References
89(1)
4 Bus and Interconnection
90(28)
4.1 System Bus
90(5)
4.1.1 Address Bus
91(2)
4.1.2 Data Bus
93(1)
4.1.3 Control Bus
93(2)
4.2 Parallel Bus and Serial Bus
95(12)
4.2.1 Parallel Buses and Parallel Communication
95(1)
4.2.2 Serial Bus and Serial Communication
96(11)
4.3 Synchronous Bus and Asynchronous Bus
107(2)
4.4 Single Bus and Multiple Buses
109(1)
4.5 Interconnection Buses
110(1)
4.6 Security Considerations for Computer Buses
111(1)
4.7 A Dual-Bus Interface Design
112(3)
4.7.1 Dual-Channel Architecture
113(1)
4.7.2 Triple-Channel Architecture
114(1)
4.7.3 A Dual-Bus Memory Interface
115(1)
4.8 Summary
115(3)
Exercises
117(1)
References
117(1)
5 I/O and Network Interface
118(26)
5.1 Direct Memory Access
118(2)
5.2 Interrupts
120(1)
5.3 Programmed I/O
121(1)
5.4 USB and IEEE 1394
122(14)
5.4.1 USB Advantages
123(1)
5.4.2 USB Architecture
123(1)
5.4.3 USB Version History
124(1)
5.4.4 USB Design and Architecture
125(2)
5.4.5 USB Mass Storage
127(1)
5.4.6 USB Interface Connectors
128(2)
5.4.7 USB Connector Types
130(3)
5.4.8 USB Power and Charging
133(3)
5.4.9 IEEE 1394
136(1)
5.5 Network Interface Card
136(3)
5.5.1 Basic NIC Architecture
137(1)
5.5.2 Data Transmission
138(1)
5.6 Keyboard, Video and Mouse (KVM) Interfaces
139(1)
5.6.1 Keyboards
140(1)
5.6.2 Video Graphic Card
140(1)
5.6.3 Mouses
140(1)
5.7 Input/Output Security
140(1)
5.7.1 Disable Certain Key Combinations
141(1)
5.7.2 Anti-Glare Displays
141(1)
5.7.3 Adding Password to Printer
141(1)
5.7.4 Bootable USB Ports
141(1)
5.7.5 Encrypting Hard Drives
141(1)
5.8 Summary
141(3)
Exercises
142(1)
References
143(1)
6 Central Processing Unit
144(28)
6.1 The Instruction Set
144(9)
6.1.1 Instruction Classifications
144(1)
6.1.2 Logic Instructions
145(1)
6.1.3 Arithmetic Instructions
145(2)
6.1.4 Intel 64/32 Instructions
147(6)
6.2 Registers
153(5)
6.2.1 General-Purpose Registers
153(2)
6.2.2 Segment Registers
155(1)
6.2.3 EFLAGS Register
156(2)
6.3 The Program Counter and Flow Control
158(3)
6.3.1 Intel Instruction Pointer
158(1)
6.3.2 Interrupt and Exception
159(2)
6.4 RISC Processors
161(3)
6.4.1 History
162(1)
6.4.2 Architecture and Programming
162(1)
6.4.3 Performance
163(1)
6.4.4 Advantages and Disadvantages
163(1)
6.4.5 Applications
164(1)
6.5 Pipelining
164(2)
6.5.1 Different Types of Pipelines
164(1)
6.5.2 Pipeline Performance Analysis
165(1)
6.5.3 Data Hazard
166(1)
6.6 CPU Security
166(2)
6.7 Virtual CPU
168(1)
6.8 Summary
169(3)
Exercises
170(1)
References
170(2)
7 Advanced Computer Architecture
172(44)
7.1 Multiprocessors
172(5)
7.1.1 Multiprocessing
172(1)
7.1.2 Cache
173(1)
7.1.3 Hyper-Threading
174(1)
7.1.4 Symmetric Multiprocessing
175(1)
7.1.5 Multiprocessing Operating Systems
175(1)
7.1.6 The Future of Multiprocessing
176(1)
7.2 Parallel Processing
177(5)
7.2.1 History of Parallel Processing
177(1)
7.2.2 Flynn's Taxonomy
178(1)
7.2.3 Bit-Level Parallelism
178(1)
7.2.4 Instruction-Level Parallelism
179(1)
7.2.5 Data-Level Parallelism
179(1)
7.2.6 Task-Level Parallelism
179(1)
7.2.7 Memory in Parallel Processing
180(1)
7.2.8 Specialized Parallel Computers
181(1)
7.2.9 The Future of Parallel Processing
182(1)
7.3 Ubiquitous Computing
182(5)
7.3.1 Ubiquitous Computing Development
183(1)
7.3.2 Basic forms of Ubiquitous Computing
184(1)
7.3.3 Augmented Reality
185(1)
7.3.4 Mobile Computing
186(1)
7.4 Grid, Distributed and Cloud Computing
187(10)
7.4.1 Characteristics of Grid Computing
187(1)
7.4.2 The Advantages and Disadvantages of Grid Computing
188(1)
7.4.3 Distributed Computing
189(1)
7.4.4 Distributed Systems
189(1)
7.4.5 Parallel and Distributed Computing
190(1)
7.4.6 Distributed Computing Architectures
190(2)
7.4.7 Cloud Computing
192(1)
7.4.8 Technical Aspects of Cloud Computing
193(1)
7.4.9 Security Aspects of Cloud Computing
194(1)
7.4.10 Ongoing and Future Elements in Cloud Computing
195(1)
7.4.11 Adoption of Cloud Computing Industry Drivers
196(1)
7.5 Internet Computing
197(6)
7.5.1 Internet Computing Concept and Model
198(1)
7.5.2 Benefit of Internet Computing for Businesses
199(2)
7.5.3 Examples of Internet Computing
201(1)
7.5.4 Migrating Internet Computing
202(1)
7.6 Virtualization
203(6)
7.6.1 Types of Virtualization
203(2)
7.6.2 History of Virtualization
205(1)
7.6.3 Virtualization Architecture
205(2)
7.6.4 Virtual Machine Monitor
207(1)
7.6.5 Examples of Virtual Machines
207(2)
7.7 Biocomputers
209(2)
7.7.1 Biochemical Computers
209(1)
7.7.2 Biomechanical Computers
209(1)
7.7.3 Bioelectronic Computers
210(1)
7.8 Summary
211(5)
Exercises
212(2)
References
214(2)
8 Assembly Language and Operating Systems
216(25)
8.1 Assembly Language Basics
217(6)
8.1.1 Numbering Systems
217(2)
8.1.2 The Binary Numbering System and Base Conversions
219(1)
8.1.3 The Hexadecimal Numbering System
220(1)
8.1.4 Signed and Unsigned Numbers
221(2)
8.2 Operation Code and Operands
223(2)
8.3 Direct Addressing
225(1)
8.4 Indirect Addressing
225(1)
8.5 Stack and Buffer Overflow
226(6)
8.5.1 Calling Procedures Using CALL and RET (Return)
228(1)
8.5.2 Exploiting Stack Buffer Overflows
229(2)
8.5.3 Stack Protection
231(1)
8.6 FIFO and M/M/1 Problem
232(2)
8.6.1 FIFO Data Structure
232(1)
8.6.2 M/M/1 Model
233(1)
8.7 Kernel, Drivers and OS Security
234(4)
8.7.1 Kernel
234(1)
8.7.2 BIOS
235(1)
8.7.3 Boot Loader
236(1)
8.7.4 Device Drivers
237(1)
8.8 Summary
238(3)
Exercises
239(1)
References
240(1)
9 TCP/IP and Internet
241(39)
9.1 Data Communications
241(3)
9.1.1 Signal, Data, and Channels
242(1)
9.1.2 Signal Encoding and Modulation
243(1)
9.1.3 Shannon Theorem
244(1)
9.2 TCP/IP Protocol
244(4)
9.2.1 Network Topology
245(1)
9.2.2 Transmission Control Protocol (TCP)
246(1)
9.2.3 The User Datagram Protocol (UDP)
247(1)
9.2.4 Internet Protocol (IP)
247(1)
9.3 Network Switches
248(2)
9.3.1 Layer 1 Hubs
248(1)
9.3.2 Ethernet Switch
249(1)
9.4 Routers
250(7)
9.4.1 History of Routers
251(1)
9.4.2 Architecture
251(2)
9.4.3 Internet Protocol Version 4 (IPv4)
253(1)
9.4.4 Internet Protocol Version 6 (IPv6)
254(1)
9.4.5 Open Shortest Path First
254(2)
9.4.6 Throughput and Delay
256(1)
9.5 Gateways
257(1)
9.6 Wireless Networks and Network Address Translation (NAT)
258(9)
9.6.1 Wireless Networks
258(2)
9.6.2 Wireless Protocols
260(1)
9.6.3 WLAN Handshaking, War Driving, and WLAN Security
261(2)
9.6.4 Security Measures to Reduce Wireless Attacks
263(1)
9.6.5 The Future of Wireless Network
263(1)
9.6.6 Network Address Translation
264(1)
9.6.7 Environmental and Health Concerns Using Cellular and Wireless Devices
265(2)
9.7 Network Security
267(8)
9.7.1 Introduction
268(3)
9.7.2 Firewall Architecture
271(2)
9.7.3 Constraint and Limitations of Firewall
273(1)
9.7.4 Enterprise Firewalls
274(1)
9.8 Summary
275(2)
Exercises
276(1)
9.9 Virtual Cyber-Security Laboratory
277(3)
References
278(2)
10 Design and Implementation: Modifying Neumann Architecture
280(17)
10.1 Data Security in Computer Systems
280(4)
10.1.1 Computer Security
281(1)
10.1.2 Data Security and Data Bleaches
282(1)
10.1.3 Researches in Architecture Security
283(1)
10.2 Single-Bus View of Neumann Architecture
284(2)
10.2.1 John von Neumann Computer Architecture
284(1)
10.2.2 Modified Neumann Computer Architecture
285(1)
10.2.3 Problems Exist in John Neumann Model
286(1)
10.3 A Dual-Bus Solution
286(2)
10.4 Bus Controller
288(4)
10.4.1 Working Mechanism of the Bus Controller
288(1)
10.4.2 Co-processor Board
289(3)
10.5 Dual-Port Storage
292(1)
10.6 Micro-Operating System
292(1)
10.7 Summary
293(2)
Exercises
294(1)
10.8 Projects
295(2)
References
295(2)
Appendix A Digital Logic Simulators
297(3)
A.1 CEDAR Logic Simulator
297(1)
A.2 Logisim
298(1)
A.3 Digital Logic Simulator v0.4
298(1)
A.4 Logicly
299(1)
Appendix B Computer Security Tools
300(4)
B.1 Wireshark (Ethereal)
300(1)
B.2 Metasploit
300(1)
B.3 Nessus
301(1)
B.4 Aircrack
301(1)
B.5 Snort
301(1)
B.6 Cain and Abel
302(1)
B.7 BackTrack
302(1)
B.8 Netcat
302(1)
B.9 Tcpdump
302(1)
B.10 John the Ripper
303(1)
Appendix C Patent Application: Intrusion-Free Computer Architecture for Information and Data Security
304(9)
C.1 Background of the Invention
304(4)
C.1.1 John von Neumann Computer Architecture Model
305(1)
C.1.2 Modified Neumann Computer Architecture
305(2)
C.1.3 Problems Existed in the John Neumann Model
307(1)
C.1.4 The Goal of the Invention
307(1)
C.2 Field of Invention
308(1)
C.3 Detailed Description of the Invention
308(2)
C.4 Claim
310(3)
Index 313
Shuangbao (Paul) Wang, George Mason University, USA

Robert S. Ledley, Georgetown University, USA