Fundamentals of computer security technology
著者
書誌事項
Fundamentals of computer security technology
Prentice Hall International, c1994
Prentice-Hall international ed
大学図書館所蔵 件 / 全3件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
"Prentice-Hall international editions"--Cover
Bibliography: p. 357-387
Includes index
内容説明・目次
内容説明
This is a survey of the state-of-the-art of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and countermeasure approaches for computer security; network and database security; and security evaluation.
目次
- Threats to computer systems
- threat trees
- categorization of attacks
- Trojan horses and viruses
- common attack methods
- security labels
- the lattice of security labels
- security policies
- the Bell-Lapadula disclosure model
- BLM analysis and debate
- non-deductibility and non-interference security
- the Biba integrity model
- the Clark-Wilson integrity model
- denial of service
- safeguards and countermeasures
- auditing
- intrusion detection
- identification and authentication
- passwords
- encryption
- key management protocols
- access control
- covert channels
- composing security
- privileges and roles
- security kernels
- network security
- database security
- security evaluation
- greatest works in computer security.
「Nielsen BookData」 より