000 02004cam a2200385 i 4500
001 16470479
003 OSt
005 20230527184827.0
008 100922s2011 enka b 001 0 eng
010 _a 2010036859
020 _a9780470741153
_qpaperback
035 _a(OCoLC)ocn666401859
040 _aDLC
_cDLC
_dYDX
_dYDXCP
_dCDX
_dUKWOH
_dTTS
_dEG-CaTKH
_beng
_erda
042 _apcc
050 0 0 _aQA76.9.A25
_bG65 2011
082 0 0 _a005.8 GO.C 2011
_223
100 1 _aGollmann, Dieter,
_eauthor.
245 1 0 _aComputer security /
_cDieter Gollmann.
250 _aThird edition.
264 1 _aChichester, West Sussex :
_bWiley,
_c2011.
300 _axix, 436 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aHistory of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
520 8 _aThis text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
650 0 _aComputer security.
856 4 1 _uhttps://ebookcentral.proquest.com/lib/coventry/detail.action?docID=819182&query=Computer+security
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
998 _ahuda.mahmoud
_bM
_d2022027
998 _amona.romia
_bR
_d20220209
999 _c586
_d586