Computer security / Dieter Gollmann.
Material type: TextPublisher: Chichester, West Sussex : Wiley, 2011Edition: Third editionDescription: xix, 436 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9780470741153
- 005.8 GO.C 2011 23
- QA76.9.A25 G65 2011
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 190354 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 192587 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 192588 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 192589 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 192590 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 191379 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 191381 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 191084 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 191085 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 191086 | ||
Books | The Knowledge Hub Library | Computing | 005.8 GO.C 2011 (Browse shelf(Opens below)) | Available | 191087 |
Browsing The Knowledge Hub Library shelves, Collection: Computing Close shelf browser (Hides shelf browser)
005.8 GO.C 2011 Computer security / | 005.8 GO.C 2011 Computer security / | 005.8 GO.C 2011 Computer security / | 005.8 GO.C 2011 Computer security / | 005.8 GO.C 2011 Computer security / | 005.8 GO.C 2011 Computer security / | 005.8 GO.C 2011 Computer security / |
Includes bibliographical references and index.
History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
There are no comments on this title.