Introduction to Computer Security
Matt Bishop
- 出版商: Addison Wesley
- 出版日期: 2004-10-26
- 售價: $1,050
- 貴賓價: 9.8 折 $1,029
- 語言: 英文
- 頁數: 792
- 裝訂: Hardcover
- ISBN: 0321247442
- ISBN-13: 9780321247445
-
相關分類:
資訊安全
下單後立即進貨 (約5~7天)
買這商品的人也買了...
-
$1,400$1,330 -
$760$600 -
$2,330$2,214 -
$590$466 -
$490$441 -
$620$490 -
$1,660$1,577 -
$750$675 -
$560$504 -
$750$593 -
$520$442 -
$490$382 -
$990$782 -
$1,080$1,058 -
$2,330$2,214 -
$650$553 -
$650$507 -
$440$348 -
$490$387 -
$780$702 -
$650$507 -
$550$468 -
$320$288 -
$720$569 -
$580$493
相關主題
商品描述
Description:
In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments.
Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.
Coverage includes
- Confidentiality, integrity, and availability
- Operational issues, cost-benefit and risk analyses, legal and human factors
- Planning and implementing effective access control
- Defining security, confidentiality, and integrity policies
- Using cryptography and public-key systems, and recognizing their limits
- Understanding and using authentication: from passwords to biometrics
- Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more
- Controlling information flow through systems and networks
- Assuring security throughout the system lifecycle
- Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them
- Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention
- Applying security principles to networks, systems, users, and programs
Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
Table of Contents:
1. An Overview of Computer Security.
The Basic Components.
Threats.
Policy and Mechanism.
Assumptions and Trust.
Assurance.
Operational Issues.
Human Issues.
Tying It All Together.
Summary.
Further Reading.
Exercises.
2. Access Control Matrix.
Protection State.
Access Control Matrix Model.
Protection State Transitions.
Summary.
Further Reading.
Exercises.
3. Foundational Results.
The General Question.
Basic Results.
Summary.
Exercises.
4. Security Policies.
Security Policies.
Types of Security Policies.
The Role of Trust.
Types of Access Control.
Example: Academic Computer Security Policy.
Summary.
Further Reading.
Exercises.
5. Confidentiality Policie.
Goals of Confidentiality Policies.
The Bell-LaPadula Model.
Summary.
Further Reading.
Exercises.
6. Integrity Policies.
Goals.
Biba Integrity Model.
Clark-Wilson Integrity Model.
Summary.
Exercises.
7. Hybrid Policies.
Chinese Wall Model.
Clinical Information Systems Security Policy.
Originator Controlled Access Control.
Role-Based Access Control.
Summary.
Further Reading.
Exercises.
8. Basic Cryptography
What Is Cryptography?
Classical Cryptosystems.
Public Key Cryptography.
Cryptographic Checksums.
Summary.
Further Reading.
Exercises.
9. Key Management.
Session and Interchange Keys.
Key Exchange.
Cryptographic Key Infrastructures.
Storing and Revoking Keys.
Digital Signatures.
Summary.
Further Reading.
Exercises.
10. Cipher Techniques.
Problems.
Stream and Block Ciphers.
Networks and Cryptography.
Example Protocols
Summary.
Further Reading.
Exercises.
11. Authentication.
Authentication Basics.
Passwords.
Challenge-Response.
Biometrics.
Multiple Methods.
Summary.
Exercises.
12. Design Principles.
Overview.
Design Principles.
Summary.
Exercises.
13. Representing Identity.
What Is Identity?
Files and Objects.
Users.
Groups and Roles.
Naming and Certificates.
Identity on the Web.
Summary.
Further Reading.
Exercises.
14. Access Control Mechanisms.
Access Control Lists.
Capabilities.
Locks and Keys.
Ring-Based Access Control.
Propagated Access Control Lists.
Summary.
Exercises.
15. Information Flow.
Basics and Background.
Compiler-Based Mechanisms.
Execution-Based Mechanisms.
Example Information Flow Controls.
Summary.
Exercises.
16. Confinement Problem.
The Confinement Problem.
Isolation.
Covert Channels.
Summary.
Exercises.
17. Introduction to Assurance.
Assurance and Trust.
Building Secure and Trusted Systems.
Building Security In or Adding Security Later.
Summary.
Further Reading.
Exercises.
18. Evaluating Systems.
Goals of Formal Evaluation.
TCSEC: 1983—1999.
FIPS 140: 1994—Present.
The Common Criteria: 1998—Present.
SSE-CMM: 1997—Present.
Summary.
Further Reading.
Exercises.
19. Malicious Logic.
Introduction.
Trojan Horses.
Computer Viruses.
Computer Worms.
Other Forms of Malicious Logic.
Defenses.
Summary.
Further Reading.
Exercises.
20. Vulnerability Analysis.
Introduction.
Penetration Studies.
Vulnerability Classification.
Frameworks.
Further Reading.
Exercises.
21. Auditing.
Definitions.
Anatomy of an Auditing System.
Designing an Auditing System.
A Posteriori Design.
Auditing Mechanisms.
Examples: Auditing File Systems.
Audit Browsing.
Summary.
Further Reading.
Exercises.
22. Intrusion Detection.
Principles.
Basic Intrusion Detection.
Models.
Architecture.
Organization of Intrusion Detection Systems.
Intrusion Response.
Exercises.
23. Network Security.
Introduction.
Policy Development.
Network Organization.
Availability and Network Flooding.
Anticipating Attacks.
Summary.
Exercises.
24. System Security.
Introduction.
Policy.
Networks.
Users.
Authentication.
Processes.
Files.
Retrospective.
Summary.
Further Reading.
Exercises.
25. User Security.
Policy
Access.
Files and Devices.
Processes.
Electronic Communications.
Summary.
Further Reading.
Exercises.
26. Program Security.
Introduction.
Requirements and Policy.
Design.
Refinement and Implementation.
Common Security-Related Programming Problems.
Testing, Maintenance, and Operation.
Distribution.
Further Reading.
Exercises.
27. Lattices.
Basics.
Lattices.
Exercises.
28. The Extended Euclidean Algorithm.
The Euclidean Algorithm.
The Extended Euclidean Algorithm.
Solving ax mod n = 1.
Solving ax mod n = b.
Exercises.
29. Virtual Machines.
Virtual Machine Structure.
Virtual Machine Monitor.
Exercises.
Bibliography.
Index.
商品描述(中文翻譯)
描述:
在這本權威的書籍中,廣受尊敬的實踐者和教師 Matt Bishop 提供了一個清晰且實用的信息安全藝術與科學的介紹。Bishop 的見解和現實範例將幫助任何實踐者或學生理解安全理論與 IT 環境日常安全挑戰之間的關鍵聯繫。
Bishop 解釋了安全的基本原則:不同類型的廣泛使用政策、實施這些政策的機制、政策和機制背後的原則,以及攻擊者如何顛覆這些工具——以及如何防禦攻擊者。一個實踐案例展示了如何將這些理念和機制應用於一個現實的公司。
內容涵蓋:
- 機密性、完整性和可用性
- 操作問題、成本效益和風險分析、法律和人因因素
- 計劃和實施有效的存取控制
- 定義安全、機密性和完整性政策
- 使用密碼學和公鑰系統,並認識其限制
- 理解和使用身份驗證:從密碼到生物識別
- 安全設計原則:最小特權、故障安全默認、開放設計、機制經濟等
- 控制信息在系統和網絡中的流動
- 確保整個系統生命週期的安全
- 惡意邏輯:木馬、病毒、啟動區和可執行感染者、兔子、細菌、邏輯炸彈——以及對抗它們的防禦
- 漏洞分析、滲透測試、審計、入侵檢測和預防
- 將安全原則應用於網絡、系統、用戶和程序
《計算機安全導論》改編自 Bishop 的全面且廣受讚譽的書籍《計算機安全:藝術與科學》。這個較短的版本省略了許多數學形式,使其對於數學背景較不正式的專業人士和學生,或對於更實務而非理論感興趣的讀者來說更具可讀性。
目錄:
1. 計算機安全概述
- 基本組件
- 威脅
- 政策與機制
- 假設與信任