Computer Security (photo) /

Computer Security .... the book I have been looking for years .... Viiveke Fåk, Linkưping University A comprehensive and practical text and the perfect starting point for this subject… ‘Is this system secure?’ seems, on the face of it, a straightforward question. Yet how one arrives at an answer i...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: gollmann dieter
Định dạng: Sách
Ngôn ngữ:Vietnamese
Được phát hành: New York : John Wiley & Sons , 1999
Phiên bản:In lần thứ 1
Những chủ đề:
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường CĐ Kỹ Thuật Cao Thắng
LEADER 02743nam a2200289 a 4500
001 TVCDKTCT10897
003 Thư viện trường Cao đẳng Kỹ thuật Cao Thắng
005 20170524074102.3
008 090505
980 \ \ |a Thư viện Trường CĐ Kỹ Thuật Cao Thắng 
024 |a RG_1 #1 eb0 i1 
020 # # |a 0471978442 
041 0 # |a vie 
082 # # |a 005 /   |b D308 - G 
100 1 # |a gollmann dieter 
245 0 0 |a Computer Security (photo) /   |c gollmann dieter 
250 # # |a In lần thứ 1 
260 # # |a New York :   |b John Wiley & Sons ,   |c 1999 
300 # # |a 320tr. ;   |c 29cm 
520 # # |a Computer Security .... the book I have been looking for years .... Viiveke Fåk, Linkưping University A comprehensive and practical text and the perfect starting point for this subject… ‘Is this system secure?’ seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as : 
520 # # |a Should protection focus on data, operations or users? 
520 # # |a Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network — and Web — security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. It meets a real need for a comprehensive textbook on the subject. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems. 
520 # # |a Whilst taking cast iron measures to build in security at one level, what does one do to prevent attackers gaining entry from a lower level? 
650 # 4 |a Computer 
650 # 4 |a Security 
721 # # |a Công nghệ thông tin 
841 # # |b Kho Sách   |j 100030573, 100030590