Custom cover image
Custom cover image

Computer Security Art and Science

By: Contributor(s): Material type: TextTextLanguage: English Publication details: Boston : Addision-Wesley, c2019Edition: 2ndDescription: xlix, 1383 p. : illISBN:
  • 9780321712332
Subject(s): DDC classification:
  • 005.8 BIS
Online resources: Summary: SUMMARY In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication. Writing for advanced undergraduates and graduate students, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Reference Collection Reference Collection Reference Section Reference Section 005.8 BIS 2023-2024 Available 98603

SUMMARY

In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication.

Writing for advanced undergraduates and graduate students, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.