Sei sulla pagina 1di 31

STI- College Global City

1
Senior High School
Chapter 1

THE PROBLEM AND ITS BACKGROUND

Introduction

In this generation we live in a high technology generation, this is the

generation that some of our problem can be solved by the power of High-technology

devices like the Bluetooth Door block. This product is the combination of multiple

features because it uses Bluetooth technology and it is controllable via a

downloadable application. This product keeps your house secure and modernized,

delivers it in a technological way.

According to Daniel Rubin (February 14 2015) in a world where portability is

becoming increasingly important, we are constantly looking for new and innovative

ways to add convenience to our lives. One of the most frustrating things that can

happen during an average day is to find that your keys are missing and you need

to access your house entrance in case of an emergency. But every old fashioned

house use different types of key which uses unique grooves for unlocking a

doorknob of your house’s main entrance, but nowadays we all now smart phone is

always in our pocket or else in our bags. The Door block will change the way we

access our houses securely without any hassle of being stuck outside because of

misplaced keys, Just simply download the specific application for the Door block

and pair it via Bluetooth but you must set a strong combination of password so the

homeowner is the only one who can access it with permission, thought that it would
STI- College Global City
2
Senior High School
be better if you change the pin or password regularly. The Door block uses motors

to unlock the lever and it is programmed using an Arduino Board and Bluetooth chip

so at the same time Bluetooth connection will sent signals to the Arduino

Background of the Study

We are the group who conducted a research about this particular product

that we named as the Bluetooth Door Block because it has 2 functions, Bluetooth

where a person can easily access through their mobile phones using Bluetooth

connection whenever they want to lock/unlock their doors. The door block is used

to block the stranger’s phone whenever they are connected and wants to rob the

house, and when the pin reach the maximum limit of the requirement code needed

this door block will have an emergency call/text the owner using the phone number

input in Bluetooth door block.

Bluetooth door block, this product can help many people for their security from

thieves, robber, etc. You can input your own password using your mobile phone

and this product hopefully will become a weatherproof. This product's target

consumer is the Senior high school at STI Global City. In a research by

JaapHaartsen Bluetooth allows electronic devices to communicate over short

distances and is used by billions of devices worldwide. JaapHaartsen recalls the

developments that led to the establishment of the Bluetooth wireless technology

standard. A research about Jae-Young Pyun a door lock system consist of RFID
STI- College Global City
3
Senior High School
reader for user authentication, touch LCD, motor module for opening and closing of

the door, sensor modules for detecting the condition inside the house,

communication module, and control module for controlling other modules. Sensor

nodes for environment sensing are deployed at appropriate places at home.

References
DrJaapHaartsen (1994) Bluetooth inventor at Ericsson.
(https://www.google.com/amp/s/www.androidauthority.com/history-bluetooth-
explained-846345/amp/
- Egyptians (1st Centuty AD, during the Era of Roman Egypt) Roman Automatic
door, Egypt. https://en.m.wikipedia.org/wiki/Door
- Hong Sen-Yan (25-220 AD) Padlocks since late Eastern Han Dynasty at China.

Statement of the Problem

The study aims to know the importance of the Bluetooth door-block as a

source safety and security at home. More specifically it aims to answer the following

questions:

What is the profile of respondents in terms of:

1.1. age;

1.2. gender;

1.3. Strand and Section


STI- College Global City
4
Senior High School
2. What are effectiveness of the Bluetooth door block in terms to:

2.1 Security

2.2 Safetiness

3. Do you think that the product can offer to the market?

Hypothesis

The researchers want to give more advance technology about Bluetooth door

block, wherein they will be benefited by this product whenever they want to have a high

security system at their house. This product is more profitable and convenient for buyers.

The products also have a lot of advantages to the consumers because of its design and it's

easy to use, therefore it is relevant for the consumers to use.

The problems of losing the key to your door will be lessen because of the product. The

product will make the buyer feel secured about their home and also to make the buyers

security advance.

Scope and Limitations of the Study

The study focuses on the importance of Bluetooth Door-Block as a safety

and security of the house with the opinions of Senior High School students in STI

College Global City. We limit our study by focusing on their safety and security on

their homes and how it will affect their security with our product
STI- College Global City
5
Senior High School

Significance of the Study

This study will benefitthe following sectors:

Students

Students’ nowadays needs more safetiness in terms of security and also a

reliable lock to their house whenever they doing their school work outdoor and they

do not have a relative to watch their house. The researchers conduct this research

paper for them to solution their needs. So the one who will benefit to this study was

the students specially whose doing an outdoor activity or anything

they are doing to their daily routine while on outdoor.

Teacher

As teachers they also use their phones for exclusive monitoring and they

also use their phones to control their house status. They could use the door block

to monitor their house activities and at the same time access their house smartly

and remotely in addition they could also grant family members to access with

permission according to Taha Ahmed Khan improving education is a huge issue for

our society. Test scores, our perceived performance against different nations, and

different elements have pushed education to the bleeding edge of national

legislative issues, directly behind healthcare reform. Technology can be utilized to

improve teaching and learning and help our students be successful.


STI- College Global City
6
Senior High School
Programmers

As for the Programmers researchers will need help by them to prevent the

threats from other hackers like the black hat hackers. They will handle the server of

the security app that the researcher made to access the Bluetooth door block. Most

of the red hat hackers are most likely will benefit to the product and the research.

Definition of Terms

The following terminologies were conceptually and/or operationally defined

for better understanding of this research.

Rechargeable - able to have its electrical energy restored by connection to a power

supply.

Device - a thing made or adapted for a particular purpose, especially a piece of

mechanical or electronic equipment.

Energy - power derived from the utilization of physical or chemical resources,

especially to provide light and heat or to work machines.

Computer - an electronic device for storing and processing data, typically in binary

form, according to instructions given to it in a variable program.

Handy - convenient to handle or useful.

Connection - A Connection is a term that describes the link between a plug or

connector into a port or jack.


STI- College Global City
7
Senior High School
Mobile - relating to mobile phones, handheld computers, and similar technology.

Storage Electronic - having or operating with the aid of many small components,

especially microchips and transistors, which control and direct an electric current.

Capacity - the maximum amount that something can contain. Corrupted - A data or

program file that has been altered accidentally by hardware or software failure.

Red hat hackers - These are the vigilantes of the hacker world. They’re like White

Hats in that they halt Black Hats.

Chapter 2
Review of Related Literature Related literature

Foreign Studies

Nowadays, the case of home robberies has been rampant. According to the

National Council for Home Safety and Security, an average of 325,000


STI- College Global City
8
Senior High School
households are being robbed every year– and this in the United States of America

alone. Here in the Philippines, according to the survey conducted by the Social

Weather Stations or SWS in 2018, 1.4 million of Filipinos are victims of common

crimes, one of which is home robbery. Furthermore, the survey also showed that

52% of Filipinos are afraid of their own neighborhood because someone might

break into their house. Traditional locks are easily picked and often times, people

lose their keys. The idea of keyless doors paved the way for innovated security

lock system.

With the rising technology and modernizations, not only the convenience in digital

age is advancing but also the safety and the security of households. Given the

human nature to innovate, with the continuous work to provide services that would

lead to the betterment of livelihood, a developer has created an advance security

system. There has been a new trend these days about smart-locks— a

combination of lock system and technology— which provides peace of mind for

people who are worried for burglars. Smart locks are electromechanical lock

which is designed to perform locking and unlocking operations on a door when it

receives such instructions from an authorized device using a wireless protocol

and a cryptographic key to execute the authorization process (Wired 2013).

One of the most common smart-locks are the Bluetooth Door Locks, according to

a journal published J.P Chaudhari (2016) Bluetooth based lock system is a house
STI- College Global City
9
Senior High School
innovation that utilizes Bluetooth function available in smart devices. The

framework of using Bluetooth turns out to be more simple and productive for

proper utilization. Such systems are generally based on Arduino platform — an

open-source electronics prototyping platform based on flexible, easy-to-use

hardware and software. The hardware of such framework is the combination of

smart phone and Bluetooth module. Arduino microcontroller in the Bluetooth Door

Lock is acting as a controller and solenoid— a device that converts electrical

energy to mechanical energy — can be acting as output of locking system.

In a study conducted by Pavel (2015) he explained how Bluetooth Door Locks

work, he stated that the system was designed to remotely configure the door

using a mobile phone and to give access strictly, only to the authorized personnel.

It is based on a few key parts: Bluetooth-radio communication, serial

communication, GUI monitoring system and embedded system. There are used

two HC-06 Bluetooth-to-UART modules, one of which is connected to the

embedded system which controls the lock, another one is connected to the serial

port of the host PC, in order to receive the data and to show all the needed

information about the personnel according to that data. The embedded system

consists of the Atmega32L microcontroller, a few transistors and a solenoid, which

opens the door.

Local Studies
STI- College Global City
10
Senior High School
In this paper, we examines on how the Bluetooth door block can be applied in

some local regions and areas in the Philippines that are prone to the robberies

and conduct some research to prevent that kind of situation. This research is

informed by a comprehensive literature review and evaluation of the studies.

This research indicates the development of our product as we upgraded it to a

great potential of having a device that can prevent robberies and crimes with the

help of our phones. We conduct research with local students to find out what

changes and changes in our product as we know how to apply it in some cases

and to know what the advantages of having this product are. In this paper, we

applied some research and know the possible outcomes that may occur if your

house is not that safe especially in the poor areas of the Philippines. With that in

mind, we know that multiple regions are involved to some crimes, robbing and

even murder. With the help of this research, we can know more how to live a

satisfy life without those crimes as we can be safe without any interactions and

can live peacefully. This paper concludes the evidence of some local studies that

we studied and applied with the help of some further investigation and

preparation.

According to Merga (2018) Bluetoothsecurity is ensured via data encryption, as

well as devices authorization procedure. Encryption of data is from 8 to 128 bits,

which allows setting the level of resistance of the resulting encryption in

accordance with the legislation of each country. Therefore it is necessary tosay

that properly configured Bluetooth devices cannot connect spontaneously,


STI- College Global City
11
Senior High School
therefore, any leaking sensitive information to unauthorized persons is not

possible. Moreover, there is no limit on the level of protection for a specific

application.Bluetooth (BT) wireless technology provides an easy way for a wide

range of devices to communicate with each other and connect to the Internet

without the need for wires, cables and connectors. It is supported and used in

products by over 3000 companies, including large corporations such as Sony

Ericsson, Nokia, Motorola, Intel, IBM, Toshiba, Motorola, Apple, Microsoft, and

even Toyota, Lexus and BMW. A variety of products available on the market have

short range Bluetooth radios installed, including printers, laptops, keyboards, cars

and the most popular type of Bluetooth enabled devices - mobile phones, driving

60% of the Bluetooth market. The technology has already gained enormous

popularity, with more than 3 million Bluetooth-enabled products shipping every

week. According to IDC, there will be over 922 million Bluetooth enabled devices

worldwide by 2008. The technology seems to be very interesting and beneficial,

yet it can also be a high threat for the privacy and security of Bluetooth users

The idea behind Bluetooth technology was born in 1994, when a team of

researchers at Ericsson Mobile Communications, led by Dr.JaapHaartsen and Dr.

Sven Mattisson, initiated a feasibility study of universal short-range, low-power

wireless connectivity as a way of eliminating cables between mobile phones and

computers, headsets and other devices. It was later developed into the Bluetooth

technology we know today by the Bluetooth Special Interest Group (SIG), an


STI- College Global City
12
Senior High School
industry association which was announced in May 1998 and formally founded in

September 1998. The founding members were Ericsson, IBM, Intel, Nokia and

Toshiba, and later in December 1999, 3Com Corporation, Lucent Technologies,

Microsoft Corporation and Motorola Inc. joined the Bluetooth SIG.

After years of development the final Bluetooth technology uses the free and

globally available 2.4GHz Industrial Scientific-Medical (ISM) radio band,

unlicensed for low-power use, and allows two Bluetooth devices within 10-100 m

range to share data with throughput up to 723.2 Kbps, or 2.1Mbps with the new

Enhanced Data Rate specification already released in 2005. Each device can

simultaneously communicate with up to seven other devices per piconet.

Bluetooth technology is also intended to be secure by providing authentication,

encryption, quality of service (QoS) control and other security features. However,

it will be shown that Bluetooth is vulnerable in a number of ways, opening the door

for many malicious attacks now and in the future.

Chapter 3

RESEARCH METHODOLOGY

This chapter discusses the methods and procedures used in this research

of the product. This is where the researcher explains what method they use to
STI- College Global City
13
Senior High School
measure the respondents of the research, the instrument that have been use, and

the technique to measure the percentage.

Research Design

To be able to gather the relevant information of the study, the researchers

made use of a descriptive type of research method. Descriptive is a type of research

method that describes an existing or current phenomenon (Bowling 1997, & Grove

1997) this type of method gives the respondents pre-determined the Bluetooth

door-block’s usefulness.

Sampling Technique

In sampling technique the researcher use the central limit theorem to

determine the respondents that will be needed in the research. According to

LaMorte (2016) the central limit theorem states that if you have a population with

mean μ and standard deviation σ and take sufficiently large random samples from

the population with replacement text annotation indicator, then the distribution of

the sample means will be approximately normally distributed. This will hold true

regardless of whether the source population is normal or skewed, provided the

sample size is sufficiently large (usually n > 30). If the population is normal, then
STI- College Global City
14
Senior High School
the theorem holds true even for samples smaller than 30. In fact, this also holds

true even if the population is binomial, provided that min (np, n (1-p))> 5, where n

is the sample size and p is the probability of success in the population. This means

that we can use the normal probability model to quantify uncertainty when making

inferences about a population mean based on the sample mean. The researchers

also uses this method is because it is easy and simple.

Instrumentation

The research instrument that the researcher uses is a questionnaire with a

pretest and a post test. The questions are based on the statement of the problem

in the chapter 1 to determine the capability of the product.

Statistical Treatment of Data

Weighted Mean (WM).Thiswas used to determine to measure the

questionnaires that have been tallied and also to determine the percentage of every

question.
STI- College Global City
15
Senior High School
TWF

WM = -------------------------

Where:
WM = Weighted Mean
TWF = Total Weighted Frequency
N = Total Population

Arbitrary Scale of Values

To determine the percentage of the product when it comes to security we

use the likert scale to measure if the product will reach its objective.

Score Verbal Interpretation

1 Strongly Agree

2 Agree

3 Disagree

4 Strongly Disagree

Good day, we are researcher from CCT-301 we are conducting our research about
our product the Bluetooth door block as a tool for your security. We will appreciate
your answer and any information obtain with this study will remain confidential.

Name (optional): Age:


Strand: Gender:
Section:
STI- College Global City
16
Senior High School
Directions: Kindly answer the following question truthfully. Provide your chosen answer
with a check ✔
Strongly Agree Disagree Strongly
Questions Agree (2) (3) Disagree
(1) (4)
The product can
be easily access
Via Bluetooth.
The product can
monitor your
Home safely.

The product is
prone to hackers
The product can
help you improve
your security at
home
The product is
useful when it
comes to
security
The product can
be safely used
by everyone
The product can
be sold through
the market

Chapter 4

PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA


STI- College Global City
17
Senior High School
This chapter discusses the analysis of data and findings from 100

questionnaires completed by STI Senior High school students who are the

respondents and completed the survey by answering the questionnaires. The

purpose of the study is to know the importance of the product regarding on the

safety and security of the house, the methods of how the researchers gathered

these data is convenience sampling.

Table 1.1

Demographic profile of the respondents in terms of Age:

As represented in table the majority of the respondents have an age range 18 to 19

that compromises of 50% of the total of respondent, while the age range of 16 to
STI- College Global City
18
Senior High School
17 compromises of 40% of the total of respondents. The age range of 20 and above

only compromise of 2% of the total of the respondents.

Table 1.2

Demographic profile of the respondents in terms of Gender:

As represented in table the total number of male are 83 respondents that

compromises of 78% while the female are 17 respondents that compromises of

17% of the total respondents of 100.

Interpretation and weighted mean of the total number of respondents.


STI- College Global City
19
Senior High School
Table 2

Questionnaire Strongly Agree Disagree Strongly

agree Disagree

1 2 3 4

1. The product can 43 47 10 0


be easily
access
via Bluetooth.

WM = 43(1)+(47)(2)+(10)(3)+4(0)

100

= 43+94+30 = 167 = 1.67 or 1.7

100 100

The table discusses how easily the product can be paired to a mobile phone using

Bluetooth. The overall weighted mean is 1.67. Out of 100 students, 43 of them

answer the question 1 with strongly agree while, 47 of the students answer it with

agree and some of them responded it with disagree. Based on weighted mean the

result is 1.67 or 1.7 the researchers round it off the weighted mean is 2 which is

agree. The respondents agree that the product can easily connect via Bluetooth.

Table 2.1

Questionnaire Strongly Agree Disagree Strongly

agree Disagree

1 2 3 4
STI- College Global City
20
Senior High School
2.The product can
monitor your
Home safely. 62 27 5 6

WM = 62(1)+(27)(2)+(5)(3)+6(4)

100

= 62+54+15+24= 155 = 1.55 or 1.6

100 100

It discusses how the product can monitor the safetiness of your house when you

are off for your outside itinerary. The overall weighted mean is 1.55. Out of 100

students, 62 of them answer the question 2 with strongly agree while, 54 of the

students answer it with agree and some of the students responded it with 5 disagree

and the other students responded with 6 disagree. Based on weighted mean the

result is 1.55 or 1.6 the researchers round it off the result of weighted mean is 2

which is agree. The respondents agree that the product can monitor their home

safely.

Table 2.2

Questionnaire Strongly Agree Disagree Strongly

agree Disagree
STI- College Global City
21
Senior High School
1 2 3 4

3. The product is
prone to
hackers 22 38 32 8

WM = 62(1)+(27)(2)+(5)(3)+8(4)

100

= 22+76+96+32 = 226 = 2.26 or 2.3

100 100

In this table it questions the respondents on how the product is prone to hackers.

The overall weighted mean is 2.26 Out of 100 students, 22 of them answer the

question 3 with strongly agree while, 38 of the students answer it with agree and

some of the students responded it with 32 disagree and the other students

responded with 8 disagree. Based on weighted mean the result is 2.26 or 2.3 the

researchers round it off the result of weighted mean is 2 which is agree. The

respondents agree that the product is prone to hackers.

Table 2.3
STI- College Global City
22
Senior High School
Questionnaire Strongly Agree Disagree Strongly

agree Disagree

1 2 3 4

4.The product can


help you
improve your 26 37 30 7
security at
home

WM = 26(1)+(37)(2)+(30)(3)+7(4)

100

= 26+74+90+28 = 218 = 2.18 or 2.2

100 100

In this table the researchers want to know if the product can improve the security at

home. The overall weighted mean is 2.18 Out of 100 students, 26 of them answer

the question 4 with strongly agree while, 37 of the students answer it with agree

and some of the students responded it with 30 disagree and the other students

responded with 7 disagree. Based on weighted mean the result is 2.18 or 2.2 the

researchers round it off the result of weighted mean is 2 which is agree. The

respondents agree that the product can help them improve their security at home.

Table 2.4
STI- College Global City
23
Senior High School
Questionnaire Strongly Agree Disagree Strongly

agree Disagree

1 2 3 4

5. The product is
useful when it
comes to 47 32 21 0

security

WM = 47(1)+(32)(2)+(21)(3)+4(0)

100

= 47+64+63 = 174= 1.74 or 1.7

100 100

In this table the researchers want to know if the product is useful when it comes to

security. The overall weighted mean is 1.74 Out of 100 students, 47 of them answer

the question 5 with strongly agree while, 32 of the students answer it with agree

and some of the students responded it with 21 disagree. Based on weighted mean

the result is 1.74 or 1.7 the researchers round it off the result of weighted mean is

2 which is agree. The respondents agree that the product is useful when it comes

to security.
STI- College Global City
24
Senior High School
Table 2.5

Questionnaire Strongly Agree Disagree Strongly

agree Disagree

1 2 3 4

6.The product can


be safely used
by 77 15 3 5
everyone

WM = 77(1)+(15)(2)+(3)(3)+5(4)

100

= 77+30+9+20 = 126 = 1.26 or 1.3

100 100

In this table it discusses if the product can be safely used for everyone. The overall

weighted mean is 1.26 Out of 100 students, 77 of them answer the question 6 with

strongly agree while, 15 of the students answer it with agree and some of the

students responded it with 3 disagree and the others responded with 5 strongly

disagree. Based on weighted mean the result is 1.26 or 1.3 the researchers round

it off the result of weighted mean is 1 which is strongly agree. The respondents

strongly agree that the product can be safely used by everyone.


STI- College Global City
25
Senior High School

Table 2.6

Questionnaire Strongly Agree Disagree Strongly

agree Disagree

1 2 3 4

7. The product
can
be sold 69 27 0 4
through
the market

WM = 69(1)+(27)(2)+3(0)+4(4)

100

= 69+54+16= 139 = 1.39 or 1.4

100 100

In this table the researchers want to know if the product can be sold in the market.

The overall weighted mean is 1.39 Out of 100 students, 69 of them answer the

question 7 with strongly agree while, 27 of the students answer it with agree and

the others responded with 4 strongly disagree. Based on weighted mean the result

is 1.39 or 1.4 the researchers round it off the result of weighted mean is 1 which is

strongly agree. The respondents strongly agree that the product can be sold to

market.
STI- College Global City
26
Senior High School

Chapter 5

CONCLUSIONS AND RECOMMENDATION

Conclusions

With the statistical data gathered from the respondents, the researchers

concluded that people do not really feel safe with their current lock systems. People

still feel a little uneasy with regards in the security that their locks systems provide.

Majority of the respondents answered that they don't really feel safe with their

household locks. However in terms of safety, the respondent thinks that the

Bluetooth door lock system is very much safer than the normal locks. Given that

the normal lock could be easily be picked with a wrench or even a bobby pin.

However Bluetooth door lock system could also be hacked since almost everyone

has an access in mobile phones which contains Bluetooth features.


STI- College Global City
27
Senior High School
Lastly, in terms of usefulness, the responding think that the Bluetooth door

lock system are very useful since the hassle of carrying around of door keys is taken

out.

Generally, Bluetooth door lock systems are found to be more reliable than current

household lock systems.

Based on the statistical data gathered and reviewed by the researchers, the

results show the efficiency, convenience and effectivity among the people who has

the same door lock systems. The researchers arrive to a conclusion that these

modern devices used for security purposes exhibit a great convenience and more

co placement that regular locks that require keys. Moreover, according to the

percentage of the numbers in the results, it showed.

The rapid advancement of technologies is very obvious. Which is why in

order to utilize the use of the technology, specifically the Bluetooth program; the

researchers have concluded that the efficacies of the bluetooth door lock.

Furthermore, in terms of feeling secured, it is safe to say that the modern door lock
STI- College Global City
28
Senior High School
system provides more assurance of security unlike the traditional door lovk system

that requires keys.

Recommendations

Following are the recommendations to improve security and to be secured

and safe of homes.

1. In terms of security researcher recommend that everyone should use

what is the best suit for your security at home. Advance security system

can be a best choice to like the Bluetooth door block because it’s a

modern security lock.

2. In terms of safetiness the researchers recommend that always make sure

that the security system that you are using is prone from harm. Also make

sure that the security system has a backup feature to make sure that it

can monitor the place very well

3. In terms of usefulness the researchers recommend that people should

use a reliable and easy to access security system like the Bluetooth door

block. This would lessen your hassle from opening your door.
STI- College Global City
29
Senior High School
4. Future Researchers should conduct a research about advance

technology security to add more knowledge and fill the gaps about their

research. This would also help them to create something more

convenient product and research about the security of homes.


STI- College Global City
30
Senior High School

REFERENCES

Mark Dowd, John McDonald, Justin Schuh (2007) The Art of Software
Security Assessment: Identifying and Preventing Software
Vulnerabilities.

Viega and McGraw, Building Secure Software (Addison-Wesley, 2001).

Howard and LeBlanc, Writing Secure Code, second edition (Microsoft


Press, 2002).

Michal Zalewski (2011) The Tangled Web: A Guide to Securing Modern


Web Applications.

OWASP project online resources.

McGraw and Felton, Securing Java: Getting Down to Business with


Mobile Code (Wiley, 1999; 1st edition: Java Security, 1997), free online
web edition.

Stein, Web Security: A Step-By-Step Reference Guide (Addison-Wesley,


1998).

Rubin, Geer and Ranum, Web Security Sourcebook: A Complete Guide to


Web Security Threats and Solutions (Wiley, 1997).

Rubin, White-Hat Security Arsenal (Addison-Wesley, 2001).


Firewalls and the Security

Menezes, van Oorschot and Vanstone, Handbook of Applied


Cryptography (CRC Press, 1996; 2001 with corrections), free online for
personal use.
STI- College Global City
31
Senior High School
Kaufman, Perlman and Speciner, Network Security: Private
Communications in a Public World, second edition (Prentice Hall, 2003).

Stallings, Cryptography and Network Security: Principles and Practice,


5/e (Prentice Hall, 2010). Relative to this book's 4th edition, the network
security components and an extra chapter on SNMP are also packaged as
Stallings' Network Security Essentials: Applications and Standards,
3/e (Prentice Hall, 2007).

Stamp, Information Security: Principles and Practice, 2/e (2011, Wiley).

Goodrich and Tamassia, Introduction to Computer Security (2010,


Addison-Wesley).

Saltzer and Kaashoek, Principles of Computer System Design (2009,


Morgan Kaufmann). Free online chapters include (pdf) Ch.11:
Information Security.

Trent Jaeger (2008), Operating System Security

Smith and Marchesini, The Craft of System Security (2007, Addison-


Wesley).

Pfleeger and Pfleeger, Security in Computing, 4/e (2007, Prentice Hall).

Bishop, Computer Security: Art and Science (2002, Addison-Wesley).


Shorter version which "omits much of the mathematical
formalism": Introduction to Computer Security (2005, Addison-Wesley).

Potrebbero piacerti anche