Fundamentals of computer security technology

書誌事項

Fundamentals of computer security technology

Edward G. Amoroso

PTR Prentice Hall, 1994

  • : pbk

大学図書館所蔵 件 / 12

この図書・雑誌をさがす

注記

Includes bibliographical references (p. 357-387) and index

内容説明・目次

内容説明

This is a survey of the state-of-the-art of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and countermeasure approaches for computer security; network and database security; and security evaluation.

目次

1. Threats to Computer Systems. 2. Threat Trees. 3. Categorization of Attacks. 4. Trojan Horses and Viruses. 5. Common Attack Methods. 6. Security Labels. 7. The Lattice of Security Labels. 8. Security Policies. 9. The Bell-Lapadula Disclosure Model. 10. BLM Analysis and Debate. 11. Non-Deductibility and Non-Interference Security. 12. The Biba Integrity Model. 13. The Clark-Wilson Integrity Model. 14. Denial of Service. 15. Safeguards and Countermeasures. 16. Auditing. 17. Intrusion Detection. 18. Identification and Authentication. 19. Passwords. 20. Encryption. 21. Key Management Protocols. 22. Access Control. 23. Covert Channels. 24. Composing Security. 25. Privileges and Roles. 26. Security Kernels. 27. Network Security. 28. Database Security. 29. Security Evaluation. Annotated Bibliography. 25 Greatest Works in Computer Security. Index.

「Nielsen BookData」 より

詳細情報

  • NII書誌ID(NCID)
    BA23094889
  • ISBN
    • 0131089293
  • LCCN
    93043586
  • 出版国コード
    us
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Englewood Cliffs, N.J.
  • ページ数/冊数
    xxii, 404 p.
  • 大きさ
    24 cm
  • 分類
  • 件名
ページトップへ