Fundamentals of computer security technology / Edward G. Amoroso
Material type:
- 133055418
- QA 76.9.A25 .A46 1994

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Engineering | GC QA 76.9.A25 .A46 1994 (Browse shelf(Opens below)) | c.1 | Available | NULIB000015536 |
Includes bibliographical references and index.
Threats to computer systems; threat trees; categorization of attacks; Trojan horses and viruses; common attack methods; security labels; the lattice of security labels; security policies; the Bell-Lapadula disclosure model; BLM analysis and debate; non-deductibility and non-interference security; the Biba integrity model; the Clark-Wilson integrity model; denial of service; safeguards and countermeasures; auditing; intrusion detection; identification and authentication; passwords; encryption; key management protocols; access control; covert channels; composing security; privileges and roles; security kernels; network security; database security; security evaluation; greatest works in computer security.
Tutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. For engineers and scientists interested in computer security. A survey of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and counter-measure approaches; network and database security; and evaluation.
There are no comments on this title.