Computer SecurityWiley, 2006 M01 18 - 386 páginas This is a brand new edition of the best-selling computer security book. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.
|
Contenido
1 | 4 |
Foundations of Computer Security | 17 |
3 | 26 |
Derechos de autor | |
Otras 19 secciones no mostradas
Otras ediciones - Ver todas
Términos y frases comunes
access control access control matrix access operations access rights algorithm applets application attack authentication Bell-LaPadula model bits block buffer byte called certificates cipher ciphertext client computer security computer system contains covert channel create criteria cryptographic database defined descriptor dictionary attacks digital signature document domain encryption enforce entity entries example execution Exercise Figure firewall hardware identity implemented input integrity Internet IPsec ITSEC Java Kerberos layer login logon machine memory mobile Multics node object operating system Orange Book packets password permissions plaintext principals privileges problem protection protocol public key query reference monitor request requirements security evaluation security level security mechanisms security model security policy server session key specific stack stored stream cipher superuser trust Unix user's verify vulnerabilities Windows write