Computer security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chichester [u.a.]
Wiley
2009
|
Ausgabe: | 2. ed., repr. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 374 S. graph. Darst. |
ISBN: | 0470862939 9780470862933 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035656825 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 090731s2009 xxud||| |||| 00||| eng d | ||
020 | |a 0470862939 |c pbk. : alk. paper |9 0-470-86293-9 | ||
020 | |a 9780470862933 |9 978-0-470-86293-3 | ||
035 | |a (OCoLC)635325809 | ||
035 | |a (DE-599)BVBBV035656825 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Gollmann, Dieter |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer security |c Dieter Gollmann |
250 | |a 2. ed., repr. | ||
264 | 1 | |a Chichester [u.a.] |b Wiley |c 2009 | |
300 | |a XI, 374 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017711304&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017711304 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804139345100144640 |
---|---|
adam_text | Preface
CHAPTERI
-
Introduction
1.1
Attacks and Attackers
1.2
Security
1.3
Security Management
1.4
Risk and Threat Analysis
- Foundations of Computer Security
2.1
Definitions
2.2
The Fundamental Dilemma of Computer Security
2.3
Data vs Information
2.4
Principles of Computer Security
2.5
The Layer Below
CHAPTER3-
Identification and Authentication
3.1 Username
and Password
3.2
Managing Passwords
3.3
Choosing Passwords
3.4
Spoofing Attacks
3.5
Protecting the Password File
3.6
Single Sign-on
3.7
Alternative Approaches
CHAPTER4- Access Control
4.1
Background
4.2
Authentication and Authorization
4.3
Access Operations
4.4
Ownership
4.5
Access Control Structures
4.6
Intermediate Controls
4.7
Partial
Orderings
CHAPTERS- Reference Monitors
5.1
Introduction
5.2
Operating System Integrity
5.3
Hardware Security Features
5.4
Protecting Memory
CHAPTER
6
-Unix Security
91
6.1
Introduction
92
6.2
Principals
93
6.3
Subjects
95
6.4
Objects
97
6.5
Access Control
101
6.6
Instances of General Security Principles
104
6.7
Management Issues
110
CHAPTER
7
-Windows
2000
Security
115
7.1
Introduction
116
7.2
Access Control
-
Components
119
7.3
Access Decisions
127
7.4
Restricted Context
132
7.5
Administration
134
CHAPTER
8-
Bell-LaPadula Model
139
8.1
State Machine Models
140
8.2
The Bell-LaPadula Model
140
8.3
The
Multics
Interpretation of BLP
146
CHAPTER
9
-Security Models
153
9.1
The
Biba
Model
154
9.2
The Chinese Wall Model
155
9.3
The Clark-Wilson Model
157
9.4
The Harrison-Ruzzo-Ullman Model
159
9.5
Information Flow Models
162
9.6
Execution Monitors
164
CHAPTER
10
-Security Evaluation
169
10.1
Introduction
170
10.2
The Orange Book
173
10.3
The Rainbow Series
177
10.4
Information Technology Security Evaluation Criteria
177
10.5
The Federal Criteria
178
10.6
The Common Criteria
179
10.7
Quality Standards
182
10.8
An Effort Well Spent?
182
CHAPTER
11
-Cryptography
185
11.1
Introduction
186
11.2
Modular Arithmetic
189
11.3
Integrity Check Functions
191
11.4
Digital Signatures
194
11.5
Encryption
198
11.6
Strength of Mechanisms
205
11.7
Performance
207
CHAPTER
12
-Authentication in Distributed Systems
211
12.1
Introduction
212
12.2
Key Establishment and Authentication
212
12.3
Key Establishment Protocols
215
12.4 Kerberos 219
12.5
Public Key Infrastructures
224
12.6
Trusted Computing-Attestation
229
CHAPTER
13 -
Network Security
233
13.1
Introduction
234
13.2
Protocol Design Principles
237
13.3
IP Security
239
13.4
SSL/TLS
243
13.5
DNS
247
13.6
Firewalls
247
13.7
Intrusion Detection
251
CHAPTER
14
-Software Security
257
14.1
Introduction
258
14.2
Characters and Numbers
259
14.3
Canonical Representations
263
14.4
Memory Management
264
14.5
Data and Code
271
14.6
Race conditions
274
14.7
Defenses
275
CHAPTERS- New Access Control Paradigms
283
15.1
Introduction
284
15.2
Code-based Access Control
286
15.3
Java Security
290
15.4
.NET Security Framework
295
15.5
Cookies
299
15.6
SPKI
301
15.7
Trust Management
302
15.8
Digital Rights Management
304
CHAPTER
16-
Mobility
307
16.1
Introduction
308
16.2
GSM
308
16.3
UMTS
313
16.4
Mobile
IPv6
Security
315
CONTENTS
16.5 WLAN 320
16.6 Bluetooth 324
CHAPTER
17
-Database Security
327
17.1
Introduction
328
17.2
Relational Databases
330
17.3
Access Control
334
17.4
Statistical Database Security
339
17.5
Integration with the Operating System
344
17.6
Privacy
346
Bibliography
349
Index
361
|
any_adam_object | 1 |
author | Gollmann, Dieter |
author_facet | Gollmann, Dieter |
author_role | aut |
author_sort | Gollmann, Dieter |
author_variant | d g dg |
building | Verbundindex |
bvnumber | BV035656825 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)635325809 (DE-599)BVBBV035656825 |
discipline | Informatik |
edition | 2. ed., repr. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01754nam a2200457zc 4500</leader><controlfield tag="001">BV035656825</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090731s2009 xxud||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470862939</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">0-470-86293-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470862933</subfield><subfield code="9">978-0-470-86293-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)635325809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035656825</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gollmann, Dieter</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="c">Dieter Gollmann</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed., repr.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester [u.a.]</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 374 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017711304&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017711304</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV035656825 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:42:36Z |
institution | BVB |
isbn | 0470862939 9780470862933 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017711304 |
oclc_num | 635325809 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XI, 374 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Gollmann, Dieter Verfasser aut Computer security Dieter Gollmann 2. ed., repr. Chichester [u.a.] Wiley 2009 XI, 374 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf 1\p (DE-588)4123623-3 Lehrbuch gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Datenschutz (DE-588)4011134-9 s 2\p DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017711304&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gollmann, Dieter Computer security Computer security Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011134-9 (DE-588)4123623-3 |
title | Computer security |
title_auth | Computer security |
title_exact_search | Computer security |
title_full | Computer security Dieter Gollmann |
title_fullStr | Computer security Dieter Gollmann |
title_full_unstemmed | Computer security Dieter Gollmann |
title_short | Computer security |
title_sort | computer security |
topic | Computer security Computersicherheit (DE-588)4274324-2 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Computer security Computersicherheit Datenschutz Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017711304&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT gollmanndieter computersecurity |