Fundamentals of computer security technology

書誌事項

Fundamentals of computer security technology

Edward G. Amoroso

Prentice Hall International, c1994

Prentice-Hall international ed

大学図書館所蔵 件 / 3

この図書・雑誌をさがす

注記

"Prentice-Hall international editions"--Cover

Bibliography: p. 357-387

Includes index

内容説明・目次

内容説明

This is a survey of the state-of-the-art of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and countermeasure approaches for computer security; network and database security; and security evaluation.

目次

  • Threats to computer systems
  • threat trees
  • categorization of attacks
  • Trojan horses and viruses
  • common attack methods
  • security labels
  • the lattice of security labels
  • security policies
  • the Bell-Lapadula disclosure model
  • BLM analysis and debate
  • non-deductibility and non-interference security
  • the Biba integrity model
  • the Clark-Wilson integrity model
  • denial of service
  • safeguards and countermeasures
  • auditing
  • intrusion detection
  • identification and authentication
  • passwords
  • encryption
  • key management protocols
  • access control
  • covert channels
  • composing security
  • privileges and roles
  • security kernels
  • network security
  • database security
  • security evaluation
  • greatest works in computer security.

「Nielsen BookData」 より

詳細情報

  • NII書誌ID(NCID)
    BA28765030
  • ISBN
    • 0133055418
  • 出版国コード
    us
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Englewood Cliffs, N.J.
  • ページ数/冊数
    xxii, 404 p.
  • 大きさ
    24 cm
  • 分類
  • 件名
ページトップへ