Computer Security : Art and Science (Hardcover)
Matt Bishop
- 出版商: Addison Wesley
- 出版日期: 2002-12-12
- 售價: $1,178
- 語言: 英文
- 頁數: 1136
- 裝訂: Hardcover
- ISBN: 0201440997
- ISBN-13: 9780201440997
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$440$374 -
$2,610$2,480 -
$990Secure Electronic Commerce, 2/e
-
$199$189 -
$1,029Fundamentals of Logic Design, 4/e
-
$980$774 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$720$569 -
$450$351 -
$2,340$2,223 -
$1,860$1,767 -
$1,650$1,568 -
$780$741 -
$1,100$1,045 -
$750$638 -
$590$466 -
$690$538 -
$720$569 -
$560$442 -
$750$675 -
$560$504 -
$1,580$1,501 -
$675LPIC 1 Exam Cram 2: Linux Professional Institute Certification Exams 101 and 102 (Paperback)
-
$650$507 -
$620$527
相關主題
商品描述
This book provides a thorough and comprehensive introduction to computer security. It covers both the theoretical foundations and practical aspects of secure systems. The theory demonstrates what is possible; the practical shows what is feasible. The book also discusses policy, because policy ultimately defines what is and is not “secure.” Throughout, the well-known author reveals the multiplex interrelationships among the many subdisciplines of computer security, and provides numerous examples to illustrate the principles and techniques discussed. This long-awaited book has been thoroughly class-tested at both the advanced undergraduate level, with an emphasis on its more applied coverage, and at the introductory graduate level, where theory and practice are covered more equally.
Table of Contents
Preface.
I. INTRODUCTION.
1. An Overview of Computer Security.
2. Access Control Matrix.
3.
Foundational Results.
III. POLICY.
4. Security Policies.
5. Confidentiality Policies.
6. Integrity
Policies.
7. Hybrid Policies.
8. Noninterference and Policy Composition.
IV. IMPLEMENTATION I: CRYPTOGRAPHY.
9. Basic Cryptography.
10. Key Management.
11. Cipher Techniques.
12. Authentication.
V. IMPLEMENTATION II: SYSTEMS.
13. Design Principles.
14. Representing Identity.
15. Access
Control Mechanisms.
16. Information Flow.
17. Confinement Problem.
VI. ASSURANCE.
18. Introduction to Assurance.
19. Building Systems with
Assurance.
20. Formal Methods.
21. Evaluating Systems.
VII. SPECIAL TOPICS.
22. Malicious Logic.
23. Vulnerability Analysis.
24. Auditing.
25. Intrusion Detection.
VIII. PRACTICUM.
26. Network Security.
27. System Security.
28. User Security.
29. Program Security.