Description |
xxxii, 747 pages : illustrations ; 24 cm |
Contents |
1. An overview of computer security -- 2. Access control matrix -- 3. Foundational results -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Basic cryptography -- 9. Key management -- 10. Cipher techniques -- 11. Authentication -- 12. Design principles -- 13. Representing identity -- 14. Access control mechanisms -- 15. Information flow -- 16. Confinement problem -- 17. Introduction to assurance -- 18. Evaluating systems -- 19. Malicious logic -- 20. Vulnerability analysis -- 21. Auditing -- 22. Intrusion detection -- 23. Network security -- 24. System security -- 25. User security -- 26. Program security -- 27. Lattices -- 28. The extended Euclidean algorithm -- 29. Virtual machines |
Notes |
Formerly CIP. Uk |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security.
|
Author |
Safari Books Online (Firm)
|
LC no. |
2004019195 |
ISBN |
0321247442 |
|
9780321247445 |
|