skip to content
Computer security : art and science Preview this item
ClosePreview this item
Checking...

Computer security : art and science

Author: Matt Bishop
Publisher: Boston : Addison-Wesley, 2003.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

"Computer Security" is useful for computer security professionals and students.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Leermiddelen (vorm)
Additional Physical Format: Print version:
(DLC) 2002026219
(OCoLC)50251943
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Matt Bishop
ISBN: 9780201440997 0201440997
OCLC Number: 54115484
Language Note: English.
Description: 1 online resource (xli, 1084 pages) : illustrations
Contents: Pt. 1. Introduction --
1. An overview of computer security --
pt. 2. Foundations --
2. Access control matrix --
3. Foundational results --
pt. 3. Policy --
4. Security policies --
5. Confidentiality policies --
6. Integrity policies --
7. Hybrid policies --
8. Noninterference and policy composition --
pt. 4. Implementation I: cryptography --
9. Basic cryptography --
10. Key management --
11. Cipher techniques --
12. Authentication --
pt. 5. Implementation II: systems --
13. Design principles --
14. Representing identity --
15. Access control mechanisms --
16. Information flow --
17. Confinement problem --
pt. 6. Assurance / by Elisabeth Sullivan --
18. Introduction to assurance --
19. Building systems with assurance --
20. Formal methods --
21. Evaluating systems --
pt. 7. Special topics --
22. Malicious logic --
23. Vulnerability analysis --
24. Auditing --
25. Intrusion detection --
pt. 8. Practicum --
26. Network security --
27. System security --
28. User security --
29. Program security --
pt. 9. End matter --
30. Lattices --
31. The extended Euclidean algorithm --
32. Entropy and uncertainty --
33. Virtual machines --
34. Symbolic logic --
35. Example academic security policy.
Responsibility: Matt Bishop.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.