000 | 02359cam a22003494a 4500 | ||
---|---|---|---|
001 | 50251943 | ||
003 | OCoLC | ||
005 | 20250428151151.0 | ||
008 | 020719s2003 maua b 001 0 eng | ||
015 | _aGBA2-U3904 | ||
020 |
_a0201440997 _q(alk. paper) |
||
020 |
_a9780201440997 _q(alk. paper) |
||
020 | _z2900201440996 | ||
035 |
_a(OCoLC)50251943 _z(OCoLC)50876313 |
||
040 |
_aDLC _beng _cDLC _dBAKER _dNLGGC _dYDXCP _dOCLCQ _dBTCTA _dLVB _dUQ1 _dOCLCG _dIG# _dMNY _dDEBBG _dBDX _dOCLCF _dOCLCQ _dUKM _dSNU _dUtOrBLW |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bB56 2003 |
082 | 0 | 0 |
_a005.8 _221 |
100 | 1 |
_aBishop, Matt _q(Matthew A.) |
|
245 | 1 | 0 |
_aComputer security : _bart and science / _cMatt Bishop |
264 | 1 |
_aBoston : _bAddison-Wesley, _c2003 |
|
300 |
_axli, 1,084 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index | ||
505 | 0 | _apt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy | |
650 | 0 | _aComputer security | |
650 | 4 | _aComputer security | |
655 | 7 |
_aLeermiddelen (vorm) _2gtt _0(NL-LeOCL)088143767 |
|
942 |
_2lcc _cBOOKS _n0 |
||
999 |
_c1545 _d1545 |