000 01134 a2200181 4500
003 Nust
005 20221019142036.0
020 _a9788177584257
040 _cNust
082 _a005.8,BIS
100 _aBishop, Matt
_967702
245 _aIntroduction to computer security /
_cMatt Bishop
260 _aIndia
_bPearsons
_c2006
300 _axxix,585p.
505 _aAn Overview of Computer Security (Page-1), Information and Security Policies (Page-26), Basic Cryptography (Page-67), Cipher Techniques (Page-89), Authentication (Page-112), Integrity Policies (Page-137), Design Principles (Page-155), Representing Identity (Page-165), Access Control Mechanisms (Page-186), Intrusion Detection (Page-207), Evaluating Systems (Page-225), Malicious Logic (Page-252), Vulerability Analysis (Page-275), Auditing (Page-305), Intrusion Detection (Page-331), Network Security (Page-359), System Security (Page-385), User Security (Page-418), Program Security (Page-439), Lattices (Page-485), The Extended Euclidean Algorithm (Page-488), Virtual Machines (Page-493).
650 _acomputer security
_9570
942 _2ddc
_cBK
_k005.8,BIS
999 _c189532
_d189532