Computer security
Material type:
- 9780470862933
Contents:
1- Introduction 2- Foundations of computer security 3- Identification and authentication 4- Access control 5- Reference monitors 6- Unix security 7- Windows 2000 security 8- Bell-La Padula model 9- Security models 10- Security evaluation 11- Cryptography 12- Authentication in distributed systems 13- Network security 14- Software security 15- New access control paradigms 16- Mobility 17- Database security -- Bibliography -- Index.
Item type | Home library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Biblioteca de la Facultad de Informática | K.6.5 GOL (Browse shelf(Opens below)) | Available | DIF-03243 |
Browsing Biblioteca de la Facultad de Informática shelves Close shelf browser (Hides shelf browser)
K.6.5 ERI Hacking : the art of exploitation | K.6.5 GAR Web security and commerce | K.6.5 GAR Web security, privacy, and commerce | K.6.5 GOL Computer security | K.6.5 GON Virus en las computadoras | K.6.5 GRA CEH - Certified Ethical Hacker : Study guide | K.6.5 GRA CEH - Certified Ethical Hacker : Study guide |
1- Introduction 2- Foundations of computer security 3- Identification and authentication 4- Access control 5- Reference monitors 6- Unix security 7- Windows 2000 security 8- Bell-La Padula model 9- Security models 10- Security evaluation 11- Cryptography 12- Authentication in distributed systems 13- Network security 14- Software security 15- New access control paradigms 16- Mobility 17- Database security -- Bibliography -- Index.