TY - BOOK AU - Bishop,Matthew TI - Computer security: art and science SN - 0201440997 (hbk.) U1 - 005.8 PY - 2003/// CY - Boston, Mass. PB - Addison-Wesley KW - Computer security N1 - Preface. - Pt. 1. Introduction. Ch. 1. An Overview of Computer Security. - Pt. 2. Foundations. Ch. 2. Access Control Matrix. Ch. 3. Foundation Results. - Pt. 3. Policy. Ch. 4. Security Policies. Ch. 5. Confidentiality Policies. Ch. 6. Integrity Policies. Ch. 7. Hybrid Policies. Ch. 8. Noninterference and Policy Composition. - Pt. 4. Implementation I: Cryptography. Ch. 9. Basic Cryptography. Ch. 10. Key Management. Ch. 11. Cipher Techniques. Ch. 12. Authentication. - Pt. 5. Implementation II : Systems. Ch. 14. Representing Identity. Ch. 15. Access Control Mechanisms. Ch. 16. Information Flow. Ch. 17. Confinement Problem. - Pt. 6. Assurance : Contributed by Elisabeth Sullivan. Ch. 19. Building Systems With Assurance. Ch. 20. Formal Methods. Ch. 21. Evaluating Systems. - Pt. 7. Special Topics. Ch. 22. Malicious Logic. Ch. 23. Vulnerability Analysis. Ch. 24. Auditing. Ch. 25. Intrusion Detection. - Pt. 8. Practicum. Ch. 26. Network Security. Ch. 27. System Security. Ch. 28. User Security. Ch. 29. Program Security. - Pt. 9. End Matter. Ch. 30. Lattices. Ch. 31. The Extended Euclidean Algorithm. Ch. 32. Entropy and Uncertainty. Ch. 33. Virtual Machines. Ch. 34. Symbolic Logic. Ch. 35. Example Academic Security Policy. - Bibliography. - Index ER -