| 000 | 01134 a2200181 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20221019142036.0 | ||
| 020 | _a9788177584257 | ||
| 040 | _cNust | ||
| 082 | _a005.8,BIS | ||
| 100 |
_aBishop, Matt _967702 |
||
| 245 |
_aIntroduction to computer security / _cMatt Bishop |
||
| 260 |
_aIndia _bPearsons _c2006 |
||
| 300 | _axxix,585p. | ||
| 505 | _aAn Overview of Computer Security (Page-1), Information and Security Policies (Page-26), Basic Cryptography (Page-67), Cipher Techniques (Page-89), Authentication (Page-112), Integrity Policies (Page-137), Design Principles (Page-155), Representing Identity (Page-165), Access Control Mechanisms (Page-186), Intrusion Detection (Page-207), Evaluating Systems (Page-225), Malicious Logic (Page-252), Vulerability Analysis (Page-275), Auditing (Page-305), Intrusion Detection (Page-331), Network Security (Page-359), System Security (Page-385), User Security (Page-418), Program Security (Page-439), Lattices (Page-485), The Extended Euclidean Algorithm (Page-488), Virtual Machines (Page-493). | ||
| 650 |
_acomputer security _9570 |
||
| 942 |
_2ddc _cBK _k005.8,BIS |
||
| 999 |
_c189532 _d189532 |
||