Find a copy online
Links to this item
proxy.library.carleton.ca Safari (Access restricted to 5 simultaneous users)
pmt-eu.hosted.exlibrisgroup.com ProQuest Safari Tech Books Online
library-collections-search.westminster.ac.uk O'Reilly Learning

Find a copy in the library
Finding libraries that hold this item...
Details
Genre/Form: | Electronic books Leermiddelen (vorm) |
---|---|
Additional Physical Format: | Print version: (DLC) 2002026219 (OCoLC)50251943 |
Material Type: | Document, Internet resource |
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Matt Bishop |
ISBN: | 9780201440997 0201440997 |
OCLC Number: | 54115484 |
Language Note: | English. |
Description: | 1 online resource (xli, 1084 pages) : illustrations |
Contents: | Pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy. |
Responsibility: | Matt Bishop. |
Reviews
User-contributed reviews
Add a review and share your thoughts with other readers.
Be the first.
Add a review and share your thoughts with other readers.
Be the first.


Tags
Add tags for "Computer security : art and science".
Be the first.