000 01439cam a22002654 4500
005 20260115083615.0
008 150607s2015 xxka g 000 0 eng d
020 _a9781292066172
_c330.00 Eg.p
040 _aMPL
_cMPL
_erda
041 0 _aara
082 0 4 _a005.8
_221
100 1 _aStallings, William
245 1 0 _acomputer security principles and practice
_cwilliam stallings, lawrie brown
250 _a3rd. Ed
264 0 _aEngland
_bPearson Education Limited
_c2014
300 _a840 pages
_billustrations
_c24 C. M
336 _aنص
337 _aبدون وسيط
338 _aكتاب
504 _aContents: History of computer security -- Managing security -- Foundations of computer security -- Identification and authentication -- Access control -- Reference monitors -- Unix security -- Windows security -- Database security -- Software security -- Bell-LaPadula model -- Security models -- Security evaluation -- Cryptography -- Key establishment -- Communications security -- Network security -- Web security -- Mobility -- New access control paradigms. Summary: This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment
596 _a1
598 _aNEW, GENR_KNOWL
650 0 0 _aComputer security
650 0 0 _asecurity
999 _c170096
_d170096