Introduction to computer security / Matt Bishop

By: Bishop, MattPublisher: India Pearsons 2006Description: xxix,585pISBN: 9788177584257Subject(s): computer securityDDC classification: 005.8,BIS
Contents:
An Overview of Computer Security (Page-1), Information and Security Policies (Page-26), Basic Cryptography (Page-67), Cipher Techniques (Page-89), Authentication (Page-112), Integrity Policies (Page-137), Design Principles (Page-155), Representing Identity (Page-165), Access Control Mechanisms (Page-186), Intrusion Detection (Page-207), Evaluating Systems (Page-225), Malicious Logic (Page-252), Vulerability Analysis (Page-275), Auditing (Page-305), Intrusion Detection (Page-331), Network Security (Page-359), System Security (Page-385), User Security (Page-418), Program Security (Page-439), Lattices (Page-485), The Extended Euclidean Algorithm (Page-488), Virtual Machines (Page-493).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,BIS (Browse shelf) Link to resource Checked out to NS Shafaq Riaz (61101-6967211-0) Almirah No.8 Shelf No.6 11/16/2024 MCS35226
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,BIS (Browse shelf) Link to resource Available Almirah No.8 Shelf No.3 MCS36839
Total holds: 0

An Overview of Computer Security (Page-1), Information and Security Policies (Page-26), Basic Cryptography (Page-67), Cipher Techniques (Page-89), Authentication (Page-112), Integrity Policies (Page-137), Design Principles (Page-155), Representing Identity (Page-165), Access Control Mechanisms (Page-186), Intrusion Detection (Page-207), Evaluating Systems (Page-225), Malicious Logic (Page-252), Vulerability Analysis (Page-275), Auditing (Page-305), Intrusion Detection (Page-331), Network Security (Page-359), System Security (Page-385), User Security (Page-418), Program Security (Page-439), Lattices (Page-485), The Extended Euclidean Algorithm (Page-488), Virtual Machines (Page-493).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.