Computer security : art and science

By: Bishop, MattMaterial type: TextTextPublication details: Delhi : Pearson Education., 2003Description: xli, 1084 p. : illustrationsISBN: 9788129701848 ; 8129701847Subject(s): Computer securityDDC classification: 005.8
Contents:
pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Reference Books Reference Books Main Library
Reference
Reference 005.8 BIS (Browse shelf(Opens below)) Available 009500
Total holds: 0

Included Index.

pt. 1. Introduction --
1. An overview of computer security --
pt. 2. Foundations --
2. Access control matrix --
3. Foundational results --
pt. 3. Policy --
4. Security policies --
5. Confidentiality policies --
6. Integrity policies --
7. Hybrid policies --
8. Noninterference and policy composition --
pt. 4. Implementation I: cryptography --
9. Basic cryptography --
10. Key management --
11. Cipher techniques --
12. Authentication --
pt. 5. Implementation II: systems --
13. Design principles --
14. Representing identity --
15. Access control mechanisms --
16. Information flow --
17. Confinement problem --
pt. 6. Assurance / by Elisabeth Sullivan --
18. Introduction to assurance --
19. Building systems with assurance --
20. Formal methods --
21. Evaluating systems --
pt. 7. Special topics --
22. Malicious logic --
23. Vulnerability analysis --
24. Auditing --
25. Intrusion detection --
pt. 8. Practicum --
26. Network security --
27. System security --
28. User security --
29. Program security --
pt. 9. End matter --
30. Lattices --
31. The extended Euclidean algorithm --
32. Entropy and uncertainty --
33. Virtual machines --
34. Symbolic logic --
35. Example academic security policy.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© University of Vavuniya

---