Image from Google Jackets

Computer security / Dieter Gollmann.

By: Material type: TextTextPublication details: Chichester, West Sussex : Wiley, 2011.Edition: 3rd edDescription: xix, 436 p. : ill. ; 24 cmISBN:
  • 9780470741153 (pbk.)
  • 0470741155 (pbk.)
Subject(s): DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 G65 2011
Contents:
History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.
Summary: This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books in General collection Books in General collection Mzuzu University Library and Learning Resources Centre Non-fiction QA 76.9 GOL 2011 (Browse shelf(Opens below)) 7541 Available MzULM-007541

Includes bibliographical references and index.

History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms.

This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment.

There are no comments on this title.

to post a comment.

Powered by Koha