Fundamentals of computer security technology / Edward G. Amoroso

By: Material type: TextTextPublication details: London, United Kingdom : Prentice-Hall, c1994Description: xxii, 404 pages : illustrations ; 25 cmISBN:
  • 133055418
Subject(s): LOC classification:
  • QA 76.9.A25 .A46 1994
Contents:
Threats to computer systems; threat trees; categorization of attacks; Trojan horses and viruses; common attack methods; security labels; the lattice of security labels; security policies; the Bell-Lapadula disclosure model; BLM analysis and debate; non-deductibility and non-interference security; the Biba integrity model; the Clark-Wilson integrity model; denial of service; safeguards and countermeasures; auditing; intrusion detection; identification and authentication; passwords; encryption; key management protocols; access control; covert channels; composing security; privileges and roles; security kernels; network security; database security; security evaluation; greatest works in computer security.
Summary: Tutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. For engineers and scientists interested in computer security. A survey of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and counter-measure approaches; network and database security; and evaluation.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Main General Circulation Computer Engineering GC QA 76.9.A25 .A46 1994 (Browse shelf(Opens below)) c.1 Available NULIB000015536

Includes bibliographical references and index.

Threats to computer systems; threat trees; categorization of attacks; Trojan horses and viruses; common attack methods; security labels; the lattice of security labels; security policies; the Bell-Lapadula disclosure model; BLM analysis and debate; non-deductibility and non-interference security; the Biba integrity model; the Clark-Wilson integrity model; denial of service; safeguards and countermeasures; auditing; intrusion detection; identification and authentication; passwords; encryption; key management protocols; access control; covert channels; composing security; privileges and roles; security kernels; network security; database security; security evaluation; greatest works in computer security.

Tutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. For engineers and scientists interested in computer security. A survey of the entire field of computer security. The work covers: threat organization, derivation and basic strategy; security model concepts, various components and details of the most familiar components; safeguard and counter-measure approaches; network and database security; and evaluation.

There are no comments on this title.

to post a comment.