<b>The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples</b>In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer
Computer security: art and science
✍ Scribed by Bishop, Matthew A.;Ruppel, Michelle;Sullivan, Elisabeth
- Publisher
- Addison-Wesley
- Year
- 2019
- Tongue
- English
- Leaves
- 1439
- Edition
- Second edition
- Category
- Library
No coin nor oath required. For personal study only.
✦ Table of Contents
Part I: Introduction Chapter 1: An Overview of Computer Security Part II: Foundations Chapter 2: Access Control Matrix Chapter 3: Foundational Results Part III: Policy Chapter 4: Security Policies Chapter 5: Confidentiality Policies Chapter 6: Integrity Policies Chapter 7: Availability Policies Chapter 8: Hybrid Policies Chapter 9: Noninterference and Policy Composition Part IV: Implementation I: Cryptography Chapter 10: Basic Cryptography Chapter 11: Key Management Chapter 12: Cipher Techniques Chapter 13: Authentication Part V: Implementation II: Systems Chapter 14: Design Principles Chapter 15: Representing Identity Chapter 16: Access Control Mechanisms Chapter 17: Information Flow Chapter 18: Confinement Problem Part VI: Assurance Chapter 19: Introduction to Assurance Chapter 20: Building Systems with Assurance Chapter 21: Formal Methods Chapter 22: Evaluating Systems Part VII: Special Topics Chapter 23: Malware Chapter 24: Vulnerability Analysis Chapter 25: Auditing Chapter 26: Intrusion Detection Chapter 27: Attacks and Responses Part VIII: Practicum Chapter 28: Network Security Chapter 29: System Security Chapter 30: User Security Chapter 31: Program Security Part IX: Appendices Appendix A: Lattices Appendix B: The Extended Euclidean Algorithm Appendix C: Entropy and Uncertainty Appendix D: Virtual Machines Appendix E: Symbolic Logic Appendix F: The Encryption Standards Appendix G: Example Academic Security Policy Appendix H: Programming Rules
✦ Subjects
Computer security;Mesures de sûreté;Réseaux d'ordinateurs;Sécurité des systèmes;Sécurité informatique;Systèmes informatiques;Mesures de sûreté;Systèmes informatiques;Sécurité des systèmes;Réseaux d'ordinateurs
📜 SIMILAR VOLUMES
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer sec
<b> The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples </b> In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern compu
Today, everyone recognizes the importance of safeguarding computer systems and networks from vulnerability, attack, and compromise. But computer security is neither an easy art nor a simple science: its methodologies and technologies require rigorous study, and a deep grounding in principles that ca
Designed for both students and practitioners, this text provides an in-depth introduction to the theory and practice of computer security. The volume opens with a discussion of mathematical fundamentals and the principles of computer security. Subsequent chapters discuss policy, implementation, and
The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University traini