01433 a2200205 4500003000500000005001700005020001800022040000900040082001400049100002500063245005400088260002600142300001500168505070000183650002700883942002300910999001900933952013900952952013601091Nust20221019142036.0 a9788177584257 cNust a005.8,BIS aBishop, Matt 967702 aIntroduction to computer security / cMatt Bishop aIndiabPearsonsc2006 axxix,585p. aAn Overview of Computer Security (Page-1), Information and Security Policies (Page-26), Basic Cryptography (Page-67), Cipher Techniques (Page-89), Authentication (Page-112), Integrity Policies (Page-137), Design Principles (Page-155), Representing Identity (Page-165), Access Control Mechanisms (Page-186), Intrusion Detection (Page-207), Evaluating Systems (Page-225), Malicious Logic (Page-252), Vulerability Analysis (Page-275), Auditing (Page-305), Intrusion Detection (Page-331), Network Security (Page-359), System Security (Page-385), User Security (Page-418), Program Security (Page-439), Lattices (Page-485), The Extended Euclidean Algorithm (Page-488), Virtual Machines (Page-493).  acomputer security9570 2ddccBKk005.8,BIS c189532d189532 00102ddc4070aMCSbMCScGENd2016-12-12l8m1o005.8,BISpMCS35226r2026-01-26s2025-10-03w2016-12-12yBKzAlmirah No.8 Shelf No.6 00102ddc4070aMCSbMCScGENd2016-12-12l4o005.8,BISpMCS36839r2025-12-26s2025-11-06w2016-12-12yBKzAlmirah No.8 Shelf No.3