Computer security / Dieter Gollmann

By: Gollmann, DieterMaterial type: TextTextPublisher: Chichester, West Sussex : John Wiley and Sons, Ltd., Publication, c2011Edition: Third editionDescription: xix, 436 pages : illustrations ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 13: 9780470741153 [paperback]Subject(s): Computer securityDDC classification:
Contents:
Contents: Chapter 1 History of computer security -- Chapter 2 Managing security -- Chapter 3 Foundations of computer security -- Chapter 4 Identification and authentication -- Chapter 5 Access control -- Chapter 6 Reference monitors -- Chapter 7 Unix security -- Chapter 8 Windows security -- Chapter 9 Database security -- Chapter 10 Software security -- Chapter 11 Bell-LaPadula model -- Chapter 12 Security models -- Chapter 13 Security evaluation -- Chapter 14 Cryptography -- Chapter 15 Key establishment -- Chapter 16 Communications security -- Chapter 17 Network security -- Chapter 18 Web security -- Chapter 19 Mobility -- Chapter 20 New access control paradigms.
Summary: This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Book Book
005.8 G58 2011 (Browse shelf) Available 3UCBL000008260

Includes bibliography and index

Contents: Chapter 1 History of computer security -- Chapter 2 Managing security -- Chapter 3 Foundations of computer security -- Chapter 4 Identification and authentication -- Chapter 5 Access control -- Chapter 6 Reference monitors -- Chapter 7 Unix security -- Chapter 8 Windows security -- Chapter 9 Database security -- Chapter 10 Software security -- Chapter 11 Bell-LaPadula model -- Chapter 12 Security models -- Chapter 13 Security evaluation -- Chapter 14 Cryptography -- Chapter 15 Key establishment -- Chapter 16 Communications security -- Chapter 17 Network security -- Chapter 18 Web security -- Chapter 19 Mobility -- Chapter 20 New access control paradigms.

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.

Computer Studies : Information System

English

There are no comments on this title.

to post a comment.

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha