000 | 02004cam a2200385 i 4500 | ||
---|---|---|---|
001 | 16470479 | ||
003 | OSt | ||
005 | 20230527184827.0 | ||
008 | 100922s2011 enka b 001 0 eng | ||
010 | _a 2010036859 | ||
020 |
_a9780470741153 _qpaperback |
||
035 | _a(OCoLC)ocn666401859 | ||
040 |
_aDLC _cDLC _dYDX _dYDXCP _dCDX _dUKWOH _dTTS _dEG-CaTKH _beng _erda |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bG65 2011 |
082 | 0 | 0 |
_a005.8 GO.C 2011 _223 |
100 | 1 |
_aGollmann, Dieter, _eauthor. |
|
245 | 1 | 0 |
_aComputer security / _cDieter Gollmann. |
250 | _aThird edition. | ||
264 | 1 |
_aChichester, West Sussex : _bWiley, _c2011. |
|
300 |
_axix, 436 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aHistory of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms. | |
520 | 8 | _aThis text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment. | |
650 | 0 | _aComputer security. | |
856 | 4 | 1 | _uhttps://ebookcentral.proquest.com/lib/coventry/detail.action?docID=819182&query=Computer+security |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
998 |
_ahuda.mahmoud _bM _d2022027 |
||
998 |
_amona.romia _bR _d20220209 |
||
999 |
_c586 _d586 |