Amazon cover image
Image from Amazon.com

Computer security / Dieter Gollmann.

By: Material type: TextTextPublisher: Chichester, West Sussex : Wiley, 2011Edition: Third editionDescription: xix, 436 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780470741153
Subject(s): DDC classification:
  • 005.8 GO.C 2011 23
LOC classification:
  • QA76.9.A25  G65 2011
Online resources:
Contents:
History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
Summary: This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 190354
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 192587
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 192588
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 192589
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 192590
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 191379
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 191381
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 191084
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 191085
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 191086
Books Books The Knowledge Hub Library Computing 005.8 GO.C 2011 (Browse shelf(Opens below)) Available 191087
Browsing The Knowledge Hub Library shelves, Collection: Computing Close shelf browser (Hides shelf browser)
005.8 GO.C 2011 Computer security / 005.8 GO.C 2011 Computer security / 005.8 GO.C 2011 Computer security / 005.8 GO.C 2011 Computer security / 005.8 GO.C 2011 Computer security / 005.8 GO.C 2011 Computer security / 005.8 GO.C 2011 Computer security /

Includes bibliographical references and index.

History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.

There are no comments on this title.

to post a comment.