Computer security /
Gollmann, Dieter.
Computer security / Dieter Gollmann - Chichester, England : Wiley, c1999 - xv, 320 pages : illustrations ; 24 cm.
Includes bibliographical references (pages 307-313) and index.
Fundamentals. Access Control. Security Models. Microprocessors. Operating Systems (Including Case Studies). Networks Security. Distributed System Security. Security APIs. Database Security. Security Evaluation. Attacks (Including Viruses).
Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings.
471978442
COMPUTER SECURITY
QA 76.9.A25 .G65 1999
Computer security / Dieter Gollmann - Chichester, England : Wiley, c1999 - xv, 320 pages : illustrations ; 24 cm.
Includes bibliographical references (pages 307-313) and index.
Fundamentals. Access Control. Security Models. Microprocessors. Operating Systems (Including Case Studies). Networks Security. Distributed System Security. Security APIs. Database Security. Security Evaluation. Attacks (Including Viruses).
Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings.
471978442
COMPUTER SECURITY
QA 76.9.A25 .G65 1999