Computer security art and science

"This is an excellent text that should be read by every computer security professional and student." —Dick Kemmerer, University of California, Santa Barbara. "This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!"...

Descripción completa

Detalles Bibliográficos
Autor principal: Bishop, Matt (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boston, MA : Addison-Wesley c2003.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626946306719
Tabla de Contenidos:
  • pt. 1. Introduction
  • 1. An overview of computer security
  • pt. 2. Foundations
  • 2. Access control matrix
  • 3. Foundational results
  • pt. 3. Policy
  • 4. Security policies
  • 5. Confidentiality policies
  • 6. Integrity policies
  • 7. Hybrid policies
  • 8. Noninterference and policy composition
  • pt. 4. Implementation I: cryptography
  • 9. Basic cryptography
  • 10. Key management
  • 11. Cipher techniques
  • 12. Authentication
  • pt. 5. Implementation II: systems
  • 13. Design principles
  • 14. Representing identity
  • 15. Access control mechanisms
  • 16. Information flow
  • 17. Confinement problem
  • pt. 6. Assurance / by Elisabeth Sullivan
  • 18. Introduction to assurance
  • 19. Building systems with assurance
  • 20. Formal methods
  • 21. Evaluating systems
  • pt. 7. Special topics
  • 22. Malicious logic
  • 23. Vulnerability analysis
  • 24. Auditing
  • 25. Intrusion detection
  • pt. 8. Practicum
  • 26. Network security
  • 27. System security
  • 28. User security
  • 29. Program security
  • pt. 9. End matter
  • 30. Lattices
  • 31. The extended Euclidean algorithm
  • 32. Entropy and uncertainty
  • 33. Virtual machines
  • 34. Symbolic logic
  • 35. Example academic security policy.