Normal view MARC view ISBD view

Computer security : art and science / Matt Bishop

By: Bishop, Matthew.
Publisher: Boston, Mass. : Addison-Wesley, c2003Description: xli, 1084 p. : ill. ; 25 cm.ISBN: 0201440997 (hbk.).Other title: Computer security [Spine title].Subject(s): Computer securityDDC classification: 005.8
Contents:
Preface. - Pt. 1. Introduction. Ch. 1. An Overview of Computer Security. - Pt. 2. Foundations. Ch. 2. Access Control Matrix. Ch. 3. Foundation Results. - Pt. 3. Policy. Ch. 4. Security Policies. Ch. 5. Confidentiality Policies. Ch. 6. Integrity Policies. Ch. 7. Hybrid Policies. Ch. 8. Noninterference and Policy Composition. - Pt. 4. Implementation I: Cryptography. Ch. 9. Basic Cryptography. Ch. 10. Key Management. Ch. 11. Cipher Techniques. Ch. 12. Authentication. - Pt. 5. Implementation II : Systems. Ch. 14. Representing Identity. Ch. 15. Access Control Mechanisms. Ch. 16. Information Flow. Ch. 17. Confinement Problem. - Pt. 6. Assurance : Contributed by Elisabeth Sullivan. Ch. 19. Building Systems With Assurance. Ch. 20. Formal Methods. Ch. 21. Evaluating Systems. - Pt. 7. Special Topics. Ch. 22. Malicious Logic. Ch. 23. Vulnerability Analysis. Ch. 24. Auditing. Ch. 25. Intrusion Detection. - Pt. 8. Practicum. Ch. 26. Network Security. Ch. 27. System Security. Ch. 28. User Security. Ch. 29. Program Security. - Pt. 9. End Matter. Ch. 30. Lattices. Ch. 31. The Extended Euclidean Algorithm. Ch. 32. Entropy and Uncertainty. Ch. 33. Virtual Machines. Ch. 34. Symbolic Logic. Ch. 35. Example Academic Security Policy. - Bibliography. - Index.
Item type Current location Call number Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU
005.8 BIS (Browse shelf) 1 Available SOCIT,15009,03,GR 5000040355

Preface. - Pt. 1. Introduction. Ch. 1. An Overview of Computer Security. - Pt. 2. Foundations. Ch. 2. Access Control Matrix. Ch. 3. Foundation Results. - Pt. 3. Policy. Ch. 4. Security Policies. Ch. 5. Confidentiality Policies. Ch. 6. Integrity Policies. Ch. 7. Hybrid Policies. Ch. 8. Noninterference and Policy Composition. - Pt. 4. Implementation I: Cryptography. Ch. 9. Basic Cryptography. Ch. 10. Key Management. Ch. 11. Cipher Techniques. Ch. 12. Authentication. - Pt. 5. Implementation II : Systems. Ch. 14. Representing Identity. Ch. 15. Access Control Mechanisms. Ch. 16. Information Flow. Ch. 17. Confinement Problem. - Pt. 6. Assurance : Contributed by Elisabeth Sullivan. Ch. 19. Building Systems With Assurance. Ch. 20. Formal Methods. Ch. 21. Evaluating Systems. - Pt. 7. Special Topics. Ch. 22. Malicious Logic. Ch. 23. Vulnerability Analysis. Ch. 24. Auditing. Ch. 25. Intrusion Detection. - Pt. 8. Practicum. Ch. 26. Network Security. Ch. 27. System Security. Ch. 28. User Security. Ch. 29. Program Security. - Pt. 9. End Matter. Ch. 30. Lattices. Ch. 31. The Extended Euclidean Algorithm. Ch. 32. Entropy and Uncertainty. Ch. 33. Virtual Machines. Ch. 34. Symbolic Logic. Ch. 35. Example Academic Security Policy. - Bibliography. - Index.

Computer programming, programs & data