Asia Pacific University Library catalogue


Computer security / Dieter Gollmann.

By: Gollmann, DieterMaterial type: TextTextPublication details: Chichester, West Sussex : Wiley, c2011Edition: 3rd edDescription: xix, 436 p. : ill. ; 24 cmISBN: 9780470741153 (pbk.)Subject(s): Computer securityDDC classification: 005.8 LOC classification: QA76.9.A25 | G65 2011
Contents:
History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
Summary: This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 G65 2011 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00007208
Staff Circulation Staff Circulation APU Library
Open Shelf
Book QA76.9.A25 G65 2011 c.2 (Browse shelf (Opens below)) 2 Available (No use restrictions) 00007209
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 G65 2011 c.3 (Browse shelf (Opens below)) 3 Available (No use restrictions) 00007210

Includes bibliographical references and index.

History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.

There are no comments on this title.

to post a comment.