Loading...

Computer security /

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.

Bibliographic Details
Main Author: Gollmann, Dieter
Format: Printed Book
Language:English
Published: New Delhi: Wiley, 2011.
Edition:3rd ed.
Subjects:
LEADER 01532cam a2200229 a 4500
008 100922s2011 enka b 001 0 eng
020 |a 9780470741153 (pbk.) 
082 0 0 |a 005.8  |2 22 
100 1 |a Gollmann, Dieter. 
245 1 0 |a Computer security /  |c Dieter Gollmann. 
250 |a 3rd ed. 
260 |a New Delhi:  |b Wiley,  |c 2011. 
300 |a xix, 436 p. :  |b ill. ;  |c 24 cm. 
504 |a Includes bibliographical references and index. 
505 0 |a History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms. 
520 8 |a This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment. 
650 0 |a Computer security. 
942 |c BK 
906 |a 7  |b cbc  |c orignew  |d 1  |e ecip  |f 20  |g y-gencatlg 
955 |b xh12 2010-09-22  |i xh12 2010-09-22  |a tc12 2011-06-13 1 copy rec'd., to CIP ver. 
999 |c 106295  |d 106295 
952 |0 0  |1 0  |4 0  |6 005_800000000000000_GOL_C  |7 0  |9 109793  |a UL  |b UL  |c ST1  |d 2015-03-17  |e 2  |g 374.25  |l 1  |m 2  |o 005.8 GOL/C  |p 93418  |r 2019-01-16  |s 2018-10-30  |v 499.00  |y BK