AUD Library Catalog

Image from Google Jackets
Normal view MARC view

Computer security : art and science / Matt Bishop.

By: Publication details: Boston : Addison-Wesley, 2003.Description: xli, 1084 p. : ill. ; 24 cmISBN:
  • 9780201440997 :
  • 0201440997 :
Subject(s): LOC classification:
  • QA76.9.A25 B56 2003
Incomplete contents:
Pt. 1. Introduction -- 1. An overview of computer security -- Pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- Pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- Pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- Pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- Pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- Pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- Pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- Pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.
Holdings
Item type Current library Home library Shelving location Call number Status Date due Barcode
Books Books American University in Dubai American University in Dubai Main Collection QA 76.9 .A25 B56 2003 (Browse shelf(Opens below)) Available 5021825

Pt. 1. Introduction -- 1. An overview of computer security -- Pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- Pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- Pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- Pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- Pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- Pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- Pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- Pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.

Includes bibliographical references and index.

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions