Computer security: art and science
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer secur...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Addison-Wesley
[2019]
|
Ausgabe: | Second edition. |
Schlagworte: | |
Zusammenfassung: | The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details. |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed January 11, 2019) |
Beschreibung: | 1 online resource (1 volume) illustrations |
ISBN: | 9780134097176 9780134097145 0134097149 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV048962547 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230516s2019 |||| o||u| ||||||eng d | ||
020 | |a 9780134097176 |c Online PQE |9 978-0-13-409717-6 | ||
020 | |a 9780134097145 |9 978-0-13-409714-5 | ||
020 | |a 0134097149 |9 0-13-409714-9 | ||
035 | |a (DE-599)KEP047443006 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Bishop, Matt |e Verfasser |0 (DE-588)129811564 |4 aut | |
245 | 1 | 0 | |a Computer security |b art and science |c Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. |
250 | |a Second edition. | ||
264 | 1 | |a Boston |b Addison-Wesley |c [2019] | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed January 11, 2019) | ||
520 | 3 | |a The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. | |
520 | 3 | |a Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. | |
520 | 3 | |a It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details. | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer networks ; Security measures | |
653 | 0 | |a Electronic books | |
653 | 0 | |a Electronic books ; local | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Sullivan, Elisabeth |4 ctb | |
700 | 1 | |a Ruppel, Michelle |4 ctb | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-3217-1233-2 |
912 | |a ZDB-30-ORH |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034226287 |
Datensatz im Suchindex
_version_ | 1804185195672240128 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bishop, Matt |
author2 | Sullivan, Elisabeth Ruppel, Michelle |
author2_role | ctb ctb |
author2_variant | e s es m r mr |
author_GND | (DE-588)129811564 |
author_facet | Bishop, Matt Sullivan, Elisabeth Ruppel, Michelle |
author_role | aut |
author_sort | Bishop, Matt |
author_variant | m b mb |
building | Verbundindex |
bvnumber | BV048962547 |
classification_rvk | ST 273 ST 277 ST 276 |
collection | ZDB-30-ORH ZDB-30-PQE |
ctrlnum | (DE-599)KEP047443006 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04093nmm a22005291c 4500</leader><controlfield tag="001">BV048962547</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230516s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780134097176</subfield><subfield code="c">Online PQE</subfield><subfield code="9">978-0-13-409717-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780134097145</subfield><subfield code="9">978-0-13-409714-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0134097149</subfield><subfield code="9">0-13-409714-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047443006</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bishop, Matt</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)129811564</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="b">art and science</subfield><subfield code="c">Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed January 11, 2019)</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books ; local</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sullivan, Elisabeth</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruppel, Michelle</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-3217-1233-2</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034226287</subfield></datafield></record></collection> |
id | DE-604.BV048962547 |
illustrated | Illustrated |
index_date | 2024-07-03T22:00:50Z |
indexdate | 2024-07-10T09:51:23Z |
institution | BVB |
isbn | 9780134097176 9780134097145 0134097149 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034226287 |
open_access_boolean | |
owner | DE-188 |
owner_facet | DE-188 |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH ZDB-30-PQE |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Bishop, Matt Verfasser (DE-588)129811564 aut Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. Second edition. Boston Addison-Wesley [2019] 1 online resource (1 volume) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed January 11, 2019) The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details. Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computer security Computer networks ; Security measures Electronic books Electronic books ; local Computersicherheit (DE-588)4274324-2 s DE-604 Datensicherung (DE-588)4011144-1 s Sullivan, Elisabeth ctb Ruppel, Michelle ctb Erscheint auch als Druck-Ausgabe, Hardcover 978-0-3217-1233-2 |
spellingShingle | Bishop, Matt Computer security art and science Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 |
title | Computer security art and science |
title_auth | Computer security art and science |
title_exact_search | Computer security art and science |
title_exact_search_txtP | Computer security art and science |
title_full | Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. |
title_fullStr | Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. |
title_full_unstemmed | Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel. |
title_short | Computer security |
title_sort | computer security art and science |
title_sub | art and science |
topic | Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datensicherung Computersicherheit |
work_keys_str_mv | AT bishopmatt computersecurityartandscience AT sullivanelisabeth computersecurityartandscience AT ruppelmichelle computersecurityartandscience |