Matches in Harvard for { <http://id.lib.harvard.edu/aleph/009074610/catalog> ?p ?o. }
  Showing items 1 to 20 of
  20
  with 100 items per page.
  
- catalog contributor b12772496.
 - catalog created "c2003.".
 - catalog date "2003".
 - catalog date "c2003.".
 - catalog dateCopyrighted "c2003.".
 - catalog description "Includes bibliographical references (p. 993-1062) and index.".
 - catalog description "pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.".
 - catalog extent "xli, 1084 p. :".
 - catalog identifier "0201440997 (recycled paper) :".
 - catalog issued "2003".
 - catalog issued "c2003.".
 - catalog language "eng".
 - catalog publisher "Boston, MA : Addison-Wesley,".
 - catalog subject "005.8 21".
 - catalog subject "Computer security.".
 - catalog subject "QA76.9.A25 B56 2003".
 - catalog tableOfContents "pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy.".
 - catalog title "Computer security : art and science / Matt Bishop.".
 - catalog type "Leermiddelen (vorm) gtt".
 - catalog type "text".