000 02084cam a22003014a 4500
001 u3383
003 SA-PMU
005 20210418123208.0
008 020719s2003 maua b 001 0 eng
010 _a 2002026219
040 _aDLC
_cDLC
_dBAKER
_dNLGGC
_dYDXCP
_dOCLCQ
_dBTCTA
_dLVB
_dUQ1
_dOCLCG
_dIG#
_dMNY
_dDEBBG
020 _a0201440997 (alk. paper)
020 _a9780201440997 (alk. paper)
035 _a(OCoLC)50251943
042 _apcc
050 0 0 _aQA76.9.A25
_bB56 2003
082 0 0 _a005.8
_221
100 1 _aBishop, Matt
_q(Matthew A.)
245 1 0 _aComputer security :
_bart and science /
_cMatt Bishop.
260 _aBoston :
_bAddison-Wesley,
_c2003.
300 _axli, 1084 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aPt. 1. Introduction -- 1. An overview of computer security -- Pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- Pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- Pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- Pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- Pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- Pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- Pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- Pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.
650 0 _aComputer security.
942 _cBOOK
994 _aZ0
_bSUPMU
596 _a1 2
999 _c1979
_d1979