What people are saying - Write a review
We haven't found any reviews in the usual places.
Fundamental Approaches to Computer
The Physical Security Environment
11 other sections not shown
access control adversary algorithm applications approach assets attack audit authentication automated backup basic Bell-LaPadula model biometric bits block callback capabilities Chapter checks cipher ciphertext computer and communications Computer Crime Computer Security computer system considered cost covert channel cryptanalysis cryptosystem database decryption detection devices dialup disk diskette effects electrical electronic employees encryption error example fiber Figure frequency functions hackers Halon hardware implemented important input involved large number layer lightning logic memory ment modulation monitor Multics multilevel secure munications National Network security node operating system OSI model password personal computer personnel physical security potential probability problems processing programs protective measures public key puter reference monitor result risk analysis satellite security environment security measures selected smart cards standard technique telephone terminal threats tion transmission types usually varistors verifiers virus voltage vulnerability