Computer security : art and science (Record no. 11803)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01671nam a2200169 a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9788129701848 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 8129701847 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | BIS |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Bishop, Matt : |
245 ## - TITLE STATEMENT | |
Title | Computer security : art and science |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Delhi : |
Name of publisher | Pearson Education., |
Year of publication | 2003. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xli, 1084 p. : |
Other physical details | illustrations ; |
500 ## - GENERAL NOTE | |
General note | Included Index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | pt. 1. Introduction --<br/>1. An overview of computer security --<br/>pt. 2. Foundations --<br/>2. Access control matrix --<br/>3. Foundational results --<br/>pt. 3. Policy --<br/>4. Security policies --<br/>5. Confidentiality policies --<br/>6. Integrity policies --<br/>7. Hybrid policies --<br/>8. Noninterference and policy composition --<br/>pt. 4. Implementation I: cryptography --<br/>9. Basic cryptography --<br/>10. Key management --<br/>11. Cipher techniques --<br/>12. Authentication --<br/>pt. 5. Implementation II: systems --<br/>13. Design principles --<br/>14. Representing identity --<br/>15. Access control mechanisms --<br/>16. Information flow --<br/>17. Confinement problem --<br/>pt. 6. Assurance / by Elisabeth Sullivan --<br/>18. Introduction to assurance --<br/>19. Building systems with assurance --<br/>20. Formal methods --<br/>21. Evaluating systems --<br/>pt. 7. Special topics --<br/>22. Malicious logic --<br/>23. Vulnerability analysis --<br/>24. Auditing --<br/>25. Intrusion detection --<br/>pt. 8. Practicum --<br/>26. Network security --<br/>27. System security --<br/>28. User security --<br/>29. Program security --<br/>pt. 9. End matter --<br/>30. Lattices --<br/>31. The extended Euclidean algorithm --<br/>32. Entropy and uncertainty --<br/>33. Virtual machines --<br/>34. Symbolic logic --<br/>35. Example academic security policy. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference Books |
Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Reference | Main Library | Main Library | Reference | 16/03/2005 | Purchased | 1350.00 | 005.8 BIS | 009500 | Reference Books |