|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
OR_on1065082493 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
040729e20041026maua o 000 0 eng d |
010 |
|
|
|a 2004019195
|
040 |
|
|
|a WYU
|b eng
|e pn
|c WYU
|d OCLCO
|d OCLCQ
|d OCLCO
|d CEF
|d OCLCO
|d VT2
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1103258484
|a 1129365429
|a 1152977797
|a 1192336025
|a 1240516219
|
020 |
|
|
|a 0321247442
|
020 |
|
|
|a 9780321247445
|
020 |
|
|
|z 9780321247445
|
020 |
|
|
|z 0321247442
|q (Trade Cloth)
|
024 |
3 |
|
|a 9780321247445
|
029 |
1 |
|
|a AU@
|b 000067099170
|
035 |
|
|
|a (OCoLC)1065082493
|z (OCoLC)1103258484
|z (OCoLC)1129365429
|z (OCoLC)1152977797
|z (OCoLC)1192336025
|z (OCoLC)1240516219
|
037 |
|
|
|b 01157628
|
050 |
|
4 |
|a QA76.9.A25B563 2004
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bishop, Matt
|q (Matthew A.),
|e author.
|
240 |
1 |
0 |
|a Introduction to Computer Security (Online)
|
245 |
1 |
0 |
|a Introduction to Computer Security.
|
260 |
|
|
|a Boston :
|b Addison Wesley Professional
|c Oct. 2004
|a Old Tappan :
|b Pearson Education [distributor]
|
300 |
|
|
|a 1 online resource (784 pages)
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
8 |
|
|a Annotation
|b In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes <ul><li>Confidentiality, integrity, and availability</li><li>Operational issues, cost-benefit and risk analyses, legal and human factors</li><li>Planning and implementing effective access control</li><li>Defining security, confidentiality, and integrity policies</li><li>Using cryptography and public-key systems, and recognizing their limits</li><li>Understanding and using authentication: from passwords to biometrics</li><li>Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more</li><li>Controlling information flow through systems and networks</li><li>Assuring security throughout the system lifecycle</li><li>Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them</li><li>Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention</li><li>Applying security principles to networks, systems, users, and programs</li></ul> Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest. <br /><br />
|
521 |
|
|
|a Scholarly & Professional
|b Addison Wesley Professional.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Bishop, Matt (Matthew A.).
|s Introduction to Computer Security (Online).
|t Introduction to Computer Security.
|d Boston : Addison Wesley Professional Oct. 2004 Old Tappan : Pearson Education [distributor]
|w (DLC) 2004019195
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0321247442/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|