9780321712332

Computer Security Art and Science

by
  • ISBN13:

    9780321712332

  • ISBN10:

    0321712331

  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 2018-09-14
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $34.65
    Check/Direct Deposit: $33.00
List Price: $99.99 Save up to $15.00
  • Buy New
    $84.99
    Add to Cart Free Shipping

    NOT YET PRINTED. PLACE AN ORDER AND WE WILL SHIP IT AS SOON AS IT ARRIVES.

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

Summary

Today, everyone recognizes the importance of safeguarding computer systems and networks from vulnerability, attack, and compromise. But computer security is neither an easy art nor a simple science: its methodologies and technologies require rigorous study, and a deep grounding in principles that can be applied even as technologies change. Moreover, practitioners must understand how to align concepts with real policies, and then actually implement those policies -- managing inevitable tradeoffs such as “How secure do our devices really need to be, and how much inconvenience can we accept?”

 

In his extensively updated Computer Security: Art and Science, 2nd Edition, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers a clear, rigorous, and thorough introduction to the entire modern field of computer security. Bishop covers access control; security, confidentiality, integrity, availability, and hybrid policies; policy composition; cryptography; authentication; identity management;  information flow; assurance; formal methods; system evaluation; vulnerability analysis; auditing; intrusion detection, and many other topics.

 

This edition adds four new chapters, including a brand-new chapter-length case study on the high-profile issue of electronic voting. Through this case study, Bishop demonstrates how principles, policies, procedures, and technology come together in a crucial real-world application.

Table of Contents

1. An Overview of Computer Security
2. Access Control Matrix
3. Foundational Results
4. Security Policies
5. Confidentiality Policies
6. Integrity Policies
7: Availability Policies
8. Hybrid Policies
9. Noninterference and Policy Composition
10. Basic Cryptography
11. Cipher Techniques
12. Key Management
13. Authentication
14. Design Principles
15. Representing Identity
16. Access Control Mechanisms
17. Information Flow
18. Confinement Problem
19. Introduction to Assurance
20. Building Systems with Assurance
21. Formal Methods
22. Evaluating Systems
23. Malicious Logic
24. Vulnerability Analysis
25. Auditing
26. Intrusion Detection
27. Attack Analysis
28. Network Security
29. System Security
30. User Security
31. Program Security
32. Security Management
33. Electronic Voting
34. Lattices
35. Entropy and Uncertainty
36. Virtual Machines
37. Symbolic Logic
38. Example Academic Security Policy
Bibliography and Index

Rewards Program

Write a Review