Computer security : art and science / Matt Bishop.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | QA76.9 .A25 B56 2003 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000082330 | |
![]() |
Main Library | QA76.9 .A25 B56 2003 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000062301 |
Browsing Main Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .A25 A345 2009 SACMAT '09: proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009 / | QA76.9 .A25 A8246 2009 Security software development : assessing and managing security risks / | QA76.9 .A25 B42 2010 Hacking for dummies / | QA76.9 .A25 B56 2003 Computer security : art and science / | QA76.9 .A25 C364 2001 Fundamentals of network security / | QA76.9 .A25 D528 2008 Digital privacy : theory, technologies, and practices / | QA76.9 .A25 E5465 2006 Enterprise security : IT security solutions : concepts, practical experiences, technologies / |
Includes bibliographical references and index.
Pt. 1. Introduction -- 1. An overview of computer security -- Pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- Pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- Pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- Pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- Pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- Pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- Pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- Pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.
1 2
There are no comments on this title.