Falls Sie nur an einem bestimmten Exempar interessiert sind, können Sie aus der folgenden Liste jenes wählen, an dem Sie interessiert sind:
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Nur diese Ausgabe anzeigen…
Computer Security: Art and Science Format: Cloth - 10 Angebote vergleichen
Preise | 2011 | 2013 | 2014 | 2015 |
---|---|---|---|---|
Schnitt | € 65,88 | € 55,13 | € 49,02 | € 70,06 |
Nachfrage |
Computer Security: Art and Science (2002)
ISBN: 9780201440997 bzw. 0201440997, in Englisch, 1136 Seiten, Addison-Wesley Professional, gebundenes Buch, neu, Erstausgabe.
Von Händler/Antiquariat, TS Sale.
The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies. Hardcover, Ausgabe: 1, Label: Addison-Wesley Professional, Addison-Wesley Professional, Produktgruppe: Book, Publiziert: 2002-12-12, Studio: Addison-Wesley Professional, Verkaufsrang: 69744.
Computer Security: Art and Science (2002)
ISBN: 9780201440997 bzw. 0201440997, in Englisch, Addison-Wesley Professional, gebundenes Buch.
Von Händler/Antiquariat, Book Deals [60506629], Lewiston, NY, U.S.A.
This Book is in Good Condition. Clean Copy With Light Amount of Wear. 100% Guaranteed. Summary: (NOTE: Each chapter, except chapter 29, concludes with a Summary, Research Issues, Further Reading, and Exercises.) Preface.Goals.Philosophy.Organization.Roadmap.Dependencies.Background.Undergraduate Level.Graduate Level.Practitioners.Special Acknowledgment.Acknowledgments.I. INTRODUCTION. 1. An Overview of Computer Security.The Basic Components.Confidentiality.Integrity.Availability.Threats.Policy and Mechanism.Goals of Security.Assumptions and Trust.Assurance.Specification.Design.Implementation.Operational Issues.Cost-Benefit Analysis.Risk Analysis.Laws and Customs.Human Issues.Organizational Problems.People Problems.Tying It All Together.II. FOUNDATIONS. 2. Access Control Matrix.Protection State.Access Control Matrix Model.Access Control by Boolean Expression Evaluation.Access Controlled by History.Protection State Transitions.Conditional Commands.Copying, Owning, and the Attenuation of Privilege.Copy Right.Own Right.Principle of Attenuation of Privilege.3. Foundational Results.The General Question.Basic Results.The Take-Grant Protection Model.Sharing of Rights.Interpretation of the Model.Theft in the Take-Grant Protection Model.Conspiracy.Summary.Closing the Gap.Schematic Protection Model.Expressive Power and the Models.Brief Comparison of HRU and SPM.Extending SPM.Simulation and Expressiveness.Typed Access Matrix Model.III. POLICY. 4. Security Policies.Security Policies.Types of Security Policies.The Role of Trust.Types of Access Control.Policy Languages.High-Level Policy Languages.Low-Level Policy Languages.Example: Academic Computer Security Policy.General University Policy.Electronic Mail Policy.Security and Precision.5. Confidentiality Policies.Goals of Confidentiality Policies.The Bell-LaPadula Model.Informal Description.Example: The Data General B2 UNIX System.Formal Model.Example Model Instantiation: Multics.Tranquility.The Controversy over the Bell-LaPadula Model.McLean's *-Property and the Basic Security Theorem.McLean's System Z and More Questions.Summary.6. Integrity Policies.Goals.Biba Integrity Model.Low-Water-Mark Policy.Ring Policy.Biba's Model (Strict Integrity Policy).Lipner's Integrity Matrix Model.Lipner's Use of the Bell-LaPadula Model.Lipner's Full Model.Comparison with Biba.Clark-Wilson Integrity Model.The Model.Comparison with the Requirements.Comparison with Other Models.7. Hybrid Policies.Chinese Wall Model.Informal Description.Formal Model.Bell-LaPadula and Chinese Wall Models.Clark-Wilson and Chinese Wall Models.Clinical.
Computer Security - Art and Science
ISBN: 9780134097169 bzw. 0134097165, in Englisch, Pearson Education, neu, Erstausgabe, E-Book, elektronischer Download.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
Computer Security: Art and Science (2002)
ISBN: 0201440997 bzw. 9780201440997, in Englisch, Addison-Wesley Professional 2002, gebraucht.
Von Händler/Antiquariat, Buchladen an der Kyll, [4359452].
Hardcover - kleine Beschädigung am Buchrücken, kleine Lagerspuren am Buch, Inhalt einwandfrei und ungelesen.
Computer Security: Art and Science (2018)
ISBN: 9780134097176 bzw. 0134097173, in Englisch, 1440 Seiten, 2. Ausgabe, Addison-Wesley Professional, neu, E-Book, elektronischer Download.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
Computer Security: Art and Science.
ISBN: 9780201440997 bzw. 0201440997, in Englisch, Addison-Wesley Professional 2002, gebraucht.
Buchladen an der Kyll, [3679606].
Hardcoverkleine Beschädigung am Buchrücken, kleine Lagerspuren am Buch, Inhalt einwandfrei und ungelesen.
Computer Security (eBook, PDF)
ISBN: 9780134097169 bzw. 0134097165, in Englisch, Pearson Education, neu, Erstausgabe, E-Book.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
Computer Security: Art and Science (paperback)
ISBN: 9780134289519 bzw. 013428951X, in Englisch, Addison-Wesley, Taschenbuch, neu.
Computer-Security~~Matt-Bishop, Computer Security: Art and Science (paperback), Paperback.