Computer security / Dieter Gollmann
Material type:
- 471978442
- QA 76.9.A25 .G65 1999

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Gen. Ed. - CCIT | GC QA 76.9.A25 .G65 1999 (Browse shelf(Opens below)) | c.1 | Available | NULIB000002542 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Gen. Ed. - CCIT Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
No cover image available | ||
GC QA 76.9 .S54 2009 Systems analysis and design methods / | GC QA 76.9.A7 .S25 [2011] Computer system architecture and organisation / | GC QA 76.9.A25 .A44 2009 Unauthorised access : physical penetration testing for IT security teams / | GC QA 76.9.A25 .G65 1999 Computer security / | GC QA 76.9.A25 .V36 2006 Digital rights management / | GC QA 76.9.A43 .G87 [2012] Algorithm analysis and design / | GC QA 76.9.A43 .H37 1992 Algorithmics : the spirit of computing / |
Includes bibliographical references (pages 307-313) and index.
Fundamentals. Access Control. Security Models. Microprocessors. Operating Systems (Including Case Studies). Networks Security. Distributed System Security. Security APIs. Database Security. Security Evaluation. Attacks (Including Viruses).
Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings.
There are no comments on this title.