Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007658177/catalog> ?p ?o. }
Showing items 1 to 26 of
26
with 100 items per page.
- catalog abstract "Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired.".
- catalog contributor b10586256.
- catalog created "c1997.".
- catalog date "1997".
- catalog date "c1997.".
- catalog dateCopyrighted "c1997.".
- catalog description "1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in General-Purpose Operating Systems -- 7. Designing Trusted Operating Systems -- 8. Data Base Security -- 9. Security in Networks and Distributed Systems -- 10. Administering Security -- 11. Legal and Ethical Issues in Computer Security.".
- catalog description "Includes bibliographical references (p. 537-559) and index.".
- catalog description "Security in Computing is the most complete and up-to-date college textbook now available. Enlivened by actual case studies and supported by more than 175 exercises, the book covers viruses, worms, Trojan horses, and other forms of malicious code; firewalls and the protection of networked systems; E-mail privacy, including PEM, PGP, key management, and certificates; key escrow - both as a technology and in the "Clipper" program; evaluation of trusted systems, including the Common Criteria, the ITSEC, and the OrangeBook; standards for program development and quality, including ISO9000 and SEI CMM; administering secure installations of PCs, UNIX, and networked environments; and ethical and legal issues in computing. A modular, layered structure makes Security in Computing ideal for classroom use as well as a reference for professionals. Once the basic tools have been covered, the remaining chapters can be studied in any order, and to any depth desired.".
- catalog extent "xviii, 574 p. :".
- catalog hasFormat "Security in computing.".
- catalog identifier "0133374866".
- catalog isFormatOf "Security in computing.".
- catalog issued "1997".
- catalog issued "c1997.".
- catalog language "eng".
- catalog publisher "Upper Saddle River, NJ : Prentice Hall PTR,".
- catalog relation "Security in computing.".
- catalog subject "005.8 20".
- catalog subject "Computer security.".
- catalog subject "Data protection.".
- catalog subject "Privacy, Right of.".
- catalog subject "QA76.9.A25 P45 1997".
- catalog tableOfContents "1. Is There a Security Problem in Computing? -- 2. Basic Encryption and Decryption -- 3. Secure Encryption Systems -- 4. Using Encryption: Protocols and Practices -- 5. Program Security -- 6. Protection in General-Purpose Operating Systems -- 7. Designing Trusted Operating Systems -- 8. Data Base Security -- 9. Security in Networks and Distributed Systems -- 10. Administering Security -- 11. Legal and Ethical Issues in Computer Security.".
- catalog title "Security in computing / Charles P. Pfleeger.".
- catalog type "text".