Description |
xxii, 404 pages : illustrations ; 24 cm |
Contents |
1. Threats to Computer Systems -- 2. Threat Trees --3. Categorization of Attacks -- 4. Trojan Horses and Viruses -- 5. Common Attack Methods -- 6. Security Labels -- 7. The Lattice of Security Labels -- 8. Security Policies -- 9. The Bell-LaPadula Disclosure Model -- 10. BLP Analysis and Debate -- 11. Nondeducibility and Noninterference Security -- 12. The Biba Integrity Model -- 13. The Clark-Wilson Integrity Model -- 14. Denial of Service -- 15. Safeguards and Countermeasures -- 16. Auditing -- 17. Intrusion Detection -- 18. Identification and Authentication -- 19. Passwords -- 20. Encryption --21. Key Management Protocols -- 22. Access Control --23. Covert Channels -- 24. Composing Security -- 25. Privileges and Roles -- 26. Security Kernels -- 27. Network Security -- 28. Database Security -- 29. Security Evaluation -- Twenty-Five Greatest Works in Computer Security |
Bibliography |
Includes bibliographical references (pages 357-387) and index |
Subject |
Computer security.
|
LC no. |
93043586 |
ISBN |
0131089293 |
|