| 000 | 01689cam a2200325 a 4500 | ||
|---|---|---|---|
| 001 | 16470479 | ||
| 005 | 20170105102351.0 | ||
| 008 | 100922s2011 enka b 001 0 eng | ||
| 010 | _a 2010036859 | ||
| 020 | _a9780470741153 (pbk.) | ||
| 020 | _a0470741155 (pbk.) | ||
| 035 | _a(OCoLC)ocn666401859 | ||
| 040 |
_aDLC _cDLC _dYDX _dYDXCP _dCDX _dUKWOH _dTTS _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bG65 2011 |
| 082 | 0 | 0 |
_a005.8 _222 |
| 100 | 1 | _aGollmann, Dieter. | |
| 245 | 1 | 0 |
_aComputer security _cDieter Gollmann |
| 250 | _a3rd ed. | ||
| 260 |
_aChichester, West Sussex : _bWiley, _c2011. |
||
| 300 |
_axix, 436 p. : _bill. ; _c24 cm. |
||
| 500 | _a1. Computer security. | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aHistory of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms. | |
| 520 | 8 | _aThis text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment. | |
| 650 | 0 | _aComputer security. | |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c11925 _d11925 |
||