Computer SecurityJohn Wiley & Sons, 2011 M02 28 - 464 páginas Completely updated and up-to-the-minute textbook for courses on computer science. The third edition has been completely revised to include new advances in software and technology over the last few years. Provides sections on Windows NT, CORBA and Java which are not examined in comparable titles. No active previous experience of security issues is necessary making this accessible to Software Developers and Managers whose responsibilities span any technical aspects of IT security. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programs for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems. |
Contenido
1990s Internet | 6 |
Managing Security | 13 |
1 | 29 |
Foundations of Computer Security | 42 |
Identification and Authentication | 49 |
8 | 63 |
Access Control | 65 |
1 | 71 |
The Multics Interpretation of | 212 |
Security Models | 219 |
The HarrisonRuzzoUllman Model | 225 |
13 | 235 |
3 | 241 |
7 | 247 |
14 | 251 |
Digital Signatures | 260 |
7 | 75 |
2 | 84 |
3 | 89 |
Controlled Invocation Interrupts | 95 |
Further Reading | 103 |
Principals | 109 |
Windows Security | 131 |
4 | 145 |
Database Security | 155 |
10 | 177 |
11 | 205 |
6 | 206 |
Data Encryption Standard 14 5 2 Block Cipher Modes | 268 |
15 | 275 |
16 | 297 |
17 | 319 |
Web Security | 339 |
19 | 363 |
Further Reading | 383 |
New Access Control Paradigms | 385 |
409 | |
423 | |