This is a brand new edition of the best-selling computer security book. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.
What people are saying - Write a review
We haven't found any reviews in the usual places.
CHAPTER2 Foundations of Computer Security
CHAPTER3 Identification and Authentication
CHAPTER4 Access Control
14 other sections not shown
access control access control matrix access operations access rights algorithm applets application attack authentication Bell-LaPadula model bits block buffer byte called certificates cipher ciphertext client computer security computer system contains covert channel create cryptographic database defined denial-of-service attacks descriptor digital signature document domain encryption enforce entity entries example execution Exercise Figure firewall identity implemented input integrity Internet IPsec ITSEC Java Kerberos layer login logon machine memory mobile mode Multics node object operating system Orange Book packets password permissions plaintext principals privileges problem protection protocol public key query reference monitor request requirements security evaluation security level security mechanisms security model security policy security-relevant server session key specific stack stored stream cipher superuser trust Unix user's username verify vulnerabilities write