Cargando…

Security in Computing Systems Challenges, Approaches and Solutions /

With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multil...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Biskup, Joachim (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-78442-5
003 DE-He213
005 20220119023331.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783540784425  |9 978-3-540-78442-5 
024 7 |a 10.1007/978-3-540-78442-5  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
100 1 |a Biskup, Joachim.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security in Computing Systems  |h [electronic resource] :  |b Challenges, Approaches and Solutions /  |c by Joachim Biskup. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XXVIII, 694 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Challenges and Basic Approaches -- Fundamental Challenges -- Computing Systems and Their Basic Vulnerabilities -- Fundamentals of Information Flow and Inference Control -- Messages, Inferences, Information and Knowledge -- Preventive Inference Control -- Security Mechanisms -- Key Ideas and Examples -- Combined Techniques -- Techniques of Control and Monitoring: Essentials -- Conceptual Access Rights -- Elements of a Security Architecture -- Monitoring and Intrusion Detection -- Techniques of Cryptography: Essentials -- Encryption -- Authentication -- Anonymization -- Some Further Cryptographic Protocols -- Implementations -- Design of Selected Systems. 
520 |a With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a Electronic data processing-Management. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a IT Operations. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642097195 
776 0 8 |i Printed edition:  |z 9783540870890 
776 0 8 |i Printed edition:  |z 9783540784418 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-78442-5  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)