| 000 | 01439cam a22002654 4500 | ||
|---|---|---|---|
| 005 | 20260115083615.0 | ||
| 008 | 150607s2015 xxka g 000 0 eng d | ||
| 020 |
_a9781292066172 _c330.00 Eg.p |
||
| 040 |
_aMPL _cMPL _erda |
||
| 041 | 0 | _aara | |
| 082 | 0 | 4 |
_a005.8 _221 |
| 100 | 1 | _aStallings, William | |
| 245 | 1 | 0 |
_acomputer security principles and practice _cwilliam stallings, lawrie brown |
| 250 | _a3rd. Ed | ||
| 264 | 0 |
_aEngland _bPearson Education Limited _c2014 |
|
| 300 |
_a840 pages _billustrations _c24 C. M |
||
| 336 | _aنص | ||
| 337 | _aبدون وسيط | ||
| 338 | _aكتاب | ||
| 504 | _aContents: History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms. Summary: This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment | ||
| 596 | _a1 | ||
| 598 | _aNEW, GENR_KNOWL | ||
| 650 | 0 | 0 | _aComputer security |
| 650 | 0 | 0 | _asecurity |
| 999 |
_c170096 _d170096 |
||