000 01689cam a2200325 a 4500
001 16470479
005 20170105102351.0
008 100922s2011 enka b 001 0 eng
010 _a 2010036859
020 _a9780470741153 (pbk.)
020 _a0470741155 (pbk.)
035 _a(OCoLC)ocn666401859
040 _aDLC
_cDLC
_dYDX
_dYDXCP
_dCDX
_dUKWOH
_dTTS
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bG65 2011
082 0 0 _a005.8
_222
100 1 _aGollmann, Dieter.
245 1 0 _aComputer security
_cDieter Gollmann
250 _a3rd ed.
260 _aChichester, West Sussex :
_bWiley,
_c2011.
300 _axix, 436 p. :
_bill. ;
_c24 cm.
500 _a1. Computer security.
504 _aIncludes bibliographical references and index.
505 0 _aHistory of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
520 8 _aThis text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
650 0 _aComputer security.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c11925
_d11925