Computer security : art and science (Record no. 11803)

MARC details
000 -LEADER
fixed length control field 01671nam a2200169 a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9788129701848
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 8129701847
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number BIS
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Bishop, Matt :
245 ## - TITLE STATEMENT
Title Computer security : art and science
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Delhi :
Name of publisher Pearson Education.,
Year of publication 2003.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xli, 1084 p. :
Other physical details illustrations ;
500 ## - GENERAL NOTE
General note Included Index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note pt. 1. Introduction --<br/>1. An overview of computer security --<br/>pt. 2. Foundations --<br/>2. Access control matrix --<br/>3. Foundational results --<br/>pt. 3. Policy --<br/>4. Security policies --<br/>5. Confidentiality policies --<br/>6. Integrity policies --<br/>7. Hybrid policies --<br/>8. Noninterference and policy composition --<br/>pt. 4. Implementation I: cryptography --<br/>9. Basic cryptography --<br/>10. Key management --<br/>11. Cipher techniques --<br/>12. Authentication --<br/>pt. 5. Implementation II: systems --<br/>13. Design principles --<br/>14. Representing identity --<br/>15. Access control mechanisms --<br/>16. Information flow --<br/>17. Confinement problem --<br/>pt. 6. Assurance / by Elisabeth Sullivan --<br/>18. Introduction to assurance --<br/>19. Building systems with assurance --<br/>20. Formal methods --<br/>21. Evaluating systems --<br/>pt. 7. Special topics --<br/>22. Malicious logic --<br/>23. Vulnerability analysis --<br/>24. Auditing --<br/>25. Intrusion detection --<br/>pt. 8. Practicum --<br/>26. Network security --<br/>27. System security --<br/>28. User security --<br/>29. Program security --<br/>pt. 9. End matter --<br/>30. Lattices --<br/>31. The extended Euclidean algorithm --<br/>32. Entropy and uncertainty --<br/>33. Virtual machines --<br/>34. Symbolic logic --<br/>35. Example academic security policy.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference Books
Holdings
Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Full call number Accession Number Koha item type
Reference Main Library Main Library Reference 16/03/2005 Purchased 1350.00 005.8 BIS 009500 Reference Books

© University of Vavuniya

---