Matt Bishop

Computer Security

Art and Science. Empfohlen von 18 bis 67 Jahre. 2. Auflage. Electronic book text. Sprachen: Englisch
eBook (epub), 1440 Seiten
EAN 9780134097176
Veröffentlicht November 2018
Verlag/Hersteller Pearson ITP

Auch erhältlich als:

Buch (Hardcover)
109,50
111,99 inkl. MwSt.
Sofort Lieferbar (Download)
Teilen
Beschreibung

The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. - Understand computer security goals, problems, and challenges, and the deep links between theory and practice - Learn how computer scientists seek to prove whether systems are secure - Define security policies for confidentiality, integrity, availability, and more - Analyze policies to reflect core questions of trust, and use them to constrain operations and change - Implement cryptography as one component of a wider computer and network security strategy - Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do - Set appropriate security goals for a system or product, and ascertain how well it meets them - Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Portrait

Matt Bishop is a professor in the Department of Computer Science at the University of California at Davis. His main research interest is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. He works in the areas of network security, including the study of denial of service attacks and defenses, policy modeling, software assurance testing, resilience, and formal modeling of access control. He was co-chair of the Joint Task Force that developed the Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity, released in December 2017. He earned his Ph.D. in computer science from Purdue University in 1984.

Inhaltsverzeichnis

- Part I: Introduction - Chapter 1: An Overview of Computer Security - Part II: Foundations - Chapter 2: Access Control Matrix - Chapter 3: Foundational Results - Part III: Policy - Chapter 4: Security Policies - Chapter 5: Confidentiality Policies - Chapter 6: Integrity Policies - Chapter 7: Availability Policies - Chapter 8: Hybrid Policies - Chapter 9: Noninterference and Policy Composition - Part IV: Implementation I: Cryptography - Chapter 10: Basic Cryptography - Chapter 11: Key Management - Chapter 12: Cipher Techniques - Chapter 13: Authentication - Part V: Implementation II: Systems - Chapter 14: Design Principles - Chapter 15: Representing Identity - Chapter 16: Access Control Mechanisms - Chapter 17: Information Flow - Chapter 18: Confinement Problem - Part VI: Assurance - Chapter 19: Introduction to Assurance - Chapter 20: Building Systems with Assurance - Chapter 21: Formal Methods - Chapter 22: Evaluating Systems - Part VII: Special Topics - Chapter 23: Malware - Chapter 24: Vulnerability Analysis - Chapter 25: Auditing - Chapter 26: Intrusion Detection - Chapter 27: Attacks and Responses - Part VIII: Practicum - Chapter 28: Network Security - Chapter 29: System Security - Chapter 30: User Security - Chapter 31: Program Security - Part IX: Appendices - Appendix A: Lattices - Appendix B: The Extended Euclidean Algorithm - Appendix C: Entropy and Uncertainty - Appendix D: Virtual Machines - Appendix E: Symbolic Logic - Appendix F: The Encryption Standards - Appendix G: Example Academic Security Policy - Appendix H: Programming Rules

Technik
Sie können dieses eBook zum Beispiel mit den folgenden Geräten lesen:
• tolino Reader 
Laden Sie das eBook direkt über den Reader-Shop auf dem tolino herunter oder übertragen Sie das eBook auf Ihren tolino mit einer kostenlosen Software wie beispielsweise Adobe Digital Editions. 
• Sony Reader & andere eBook Reader 
Laden Sie das eBook direkt über den Reader-Shop herunter oder übertragen Sie das eBook mit der kostenlosen Software Sony READER FOR PC/Mac oder Adobe Digital Editions auf ein Standard-Lesegeräte. 
• Tablets & Smartphones 
Möchten Sie dieses eBook auf Ihrem Smartphone oder Tablet lesen, finden Sie hier unsere kostenlose Lese-App für iPhone/iPad und Android Smartphone/Tablets. 
• PC & Mac 
Lesen Sie das eBook direkt nach dem Herunterladen mit einer kostenlosen Lesesoftware, beispielsweise Adobe Digital Editions, Sony READER FOR PC/Mac oder direkt über Ihre eBook-Bibliothek in Ihrem Konto unter „Meine eBooks“ -  „Sofort online lesen über Meine Bibliothek“.
 
Bitte beachten Sie, dass die Kindle-Geräte das Format nicht unterstützen und dieses eBook somit nicht auf Kindle-Geräten lesbar ist.
Hersteller
Libri GmbH
Friedensallee 273

DE - 22763 Hamburg

E-Mail: GPSR@libri.de

Website: www.libri.de

Das könnte Sie auch interessieren

Verena Keßler
Gym
eBook (epub)
Sofort lieferbar (Download)
16,99
Gabriel Yoran
Die Verkrempelung der Welt
eBook (epub)
Sofort lieferbar (Download)
18,99
Aya Jaff
Broligarchie
eBook (epub)
Sofort lieferbar (Download)
19,99
Dorothee Elmiger
Aus der Zuckerfabrik
eBook (epub)
Sofort lieferbar (Download)
13,99
Sofort lieferbar (Download)
0,00
Sofort lieferbar (Download)
22,99
Sofort lieferbar (Download)
0,00
Max Tegmark
Leben 3.0
eBook (epub)
Sofort lieferbar (Download)
14,99
Sarah Stein Lubrano
Don't Talk About Politics
eBook (epub)
Sofort lieferbar (Download)
15,99
Jimmy Wales
TRUST
eBook (epub)
Sofort lieferbar (Download)
23,99
Nicole Mayer-Ahuja
Klassengesellschaft akut
eBook (epub)
Sofort lieferbar (Download)
22,99
Heike Geißler
Arbeiten
eBook (epub)
Sofort lieferbar (Download)
14,99
Benjamín Labatut
MANIAC
eBook (epub)
Sofort lieferbar (Download)
13,99
Jean-Remy von Matt
Am Ende
eBook (epub)
Sofort lieferbar (Download)
19,99
Benjamín Labatut
Das blinde Licht
eBook (epub)
Sofort lieferbar (Download)
11,99
Hans Rosling
Factfulness
eBook (epub)
Sofort lieferbar (Download)
18,99
Claus Kühnel
Meshtastic
eBook (epub)
Sofort lieferbar (Download)
23,92
Sofort lieferbar (Download)
0,00
Robert Menasse
Die Hauptstadt
eBook (epub)
Sofort lieferbar (Download)
13,99
David Graeber
Bullshit Jobs
eBook (epub)
Sofort lieferbar (Download)
13,99
Mirjam Müller
Promotion - Postdoc - Professur
eBook (pdf)
Sofort lieferbar (Download)
26,99
Bernhard Kegel
Mit Pflanzen die Welt retten
eBook (epub)
Sofort lieferbar (Download)
10,99
Elisa Hoven
Das Ende der Wahrheit?
eBook (epub)
Sofort lieferbar (Download)
18,99
Tillmann Bendikowski
Hitlerwetter
eBook (epub)
Sofort lieferbar (Download)
12,99
Christian Westphalen
Die große Fotoschule
eBook (pdf)
Sofort lieferbar (Download)
35,92
Jane F. McAlevey
No Shortcuts
eBook (epub)
Sofort lieferbar (Download)
8,49
Jürgen Wolf
DxO PhotoLab
eBook (epub)
Sofort lieferbar (Download)
27,92
Sofort lieferbar (Download)
14,99
Simone Hoffmann
Fotografieren lernen von A bis Z
eBook (pdf)
Sofort lieferbar (Download)
23,92
Hoimar Von Ditfurth
Zusammenhänge
eBook (epub)
Sofort lieferbar (Download)
9,99
Maria Neubauer
Korruption und Schattenwirtschaft
eBook (epub)
Sofort lieferbar (Download)
0,00
Stefan Klein
Das All und das Nichts
eBook (epub)
Sofort lieferbar (Download)
12,99
Heather Gay
Bad Mormon
eBook (epub)
Sofort lieferbar (Download)
14,83
Nicole Mayer-Ahuja
Klassengesellschaft akut
eBook (pdf)
Sofort lieferbar (Download)
22,99
Rüdiger Maas
Generation arbeitsunfähig
eBook (epub)
Sofort lieferbar (Download)
14,99
Martin Schröder
Wann sind Frauen wirklich zufrieden?
eBook (epub)
Sofort lieferbar (Download)
14,99