000 | 02260nam a2200217Ia 4500 | ||
---|---|---|---|
003 | NULRC | ||
005 | 20250520102900.0 | ||
008 | 250520s9999 xx 000 0 und d | ||
020 | _a133055418 | ||
040 | _cNULRC | ||
050 | _aQA 76.9.A25 .A46 1994 | ||
100 |
_aAmoroso, Edward G. _eauthor |
||
245 | 0 |
_aFundamentals of computer security technology / _cEdward G. Amoroso |
|
260 |
_aLondon, United Kingdom : _bPrentice-Hall, _cc1994 |
||
300 |
_axxii, 404 pages : _billustrations ; _c25 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _aThreats to computer systems; threat trees; categorization of attacks; Trojan horses and viruses; common attack methods; security labels; the lattice of security labels; security policies; the Bell-Lapadula disclosure model; BLM analysis and debate; non-deductibility and non-interference security; the Biba integrity model; the Clark-Wilson integrity model; denial of service; safeguards and countermeasures; auditing; intrusion detection; identification and authentication; passwords; encryption; key management protocols; access control; covert channels; composing security; privileges and roles; security kernels; network security; database security; security evaluation; greatest works in computer security. | ||
520 | _aTutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. For engineers and scientists interested in computer security. A survey of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and counter-measure approaches; network and database security; and evaluation. | ||
650 | _aCOMPUTER SECURITY | ||
942 |
_2lcc _cBK |
||
999 |
_c17777 _d17777 |