Buy Computer Security Book by Matt Bishop - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Computer Security: Art and Science
Computer Security: Art and Science

Computer Security: Art and Science


     0     
5
4
3
2
1



International Edition


X
About the Book

An introduction to computer security

Today, everyone recognises the importance of safeguarding computer systems and networks from vulnerability, attack, and compromise. But computer security is neither an easy art nor a simple science: its methodologies and technologies require rigorous study, and a deep grounding in principles that can be applied even as technologies change. Moreover, practitioners must understand how to align concepts with real policies, and then actually implement those policies - managing inevitable tradeoffs such as 'How secure do our devices really need to be, and how much inconvenience can we accept?'

In his extensively updated Computer Security: Art and Science, Matt Bishop offers a clear, rigorous, and thorough introduction to the entire modern field of computer security. Bishop covers access control; security, confidentiality, integrity, availability, and hybrid policies; policy composition; cryptography; authentication; identity management; information flow; assurance; formal methods; system evaluation; vulnerability analysis; auditing; intrusion detection, and many other topics.

This edition adds four new chapters, including a brand-new chapter-length case study on the high-profile issue of electronic voting. Through this case study, Bishop demonstrates how principles, policies, procedures, and technology come together in a crucial real-world application.



Table of Contents:
  • Part I: Introduction
  • Chapter 1: An Overview of Computer Security
  • Part II: Foundations
  • Chapter 2: Access Control Matrix
  • Chapter 3: Foundational Results
  • Part III: Policy
  • Chapter 4: Security Policies
  • Chapter 5: Confidentiality Policies
  • Chapter 6: Integrity Policies
  • Chapter 7: Availability Policies
  • Chapter 8: Hybrid Policies
  • Chapter 9: Noninterference and Policy Composition
  • Part IV: Implementation I: Cryptography
  • Chapter 10: Basic Cryptography
  • Chapter 11: Key Management
  • Chapter 12: Cipher Techniques
  • Chapter 13: Authentication
  • Part V: Implementation II: Systems
  • Chapter 14: Design Principles
  • Chapter 15: Representing Identity
  • Chapter 16: Access Control Mechanisms
  • Chapter 17: Information Flow
  • Chapter 18: Confinement Problem
  • Part VI: Assurance
  • Chapter 19: Introduction to Assurance
  • Chapter 20: Building Systems with Assurance
  • Chapter 21: Formal Methods
  • Chapter 22: Evaluating Systems
  • Part VII: Special Topics
  • Chapter 23: Malware
  • Chapter 24: Vulnerability Analysis
  • Chapter 25: Auditing
  • Chapter 26: Intrusion Detection
  • Chapter 27: Attacks and Responses
  • Part VIII: Practicum
  • Chapter 28: Network Security
  • Chapter 29: System Security
  • Chapter 30: User Security
  • Chapter 31: Program Security
  • Part IX: Appendices
  • Appendix A: Lattices
  • Appendix B: The Extended Euclidean Algorithm
  • Appendix C: Entropy and Uncertainty
  • Appendix D: Virtual Machines
  • Appendix E: Symbolic Logic
  • Appendix F: The Encryption Standards
  • Appendix G: Example Academic Security Policy
  • Appendix H: Programming Rules


About the Author :
Matt Bishop is a professor in the Department of Computer Science at the University of California at Davis. His main research interest is the analysis of vulnerabilities in computer systems, including modelling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. He works in the areas of network security, including the study of denial of service attacks and defenses, policy modelling, software assurance testing, resilience, and formal modelling of access control. He was co-chair of the Joint Task Force that developed the Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity, released in December 2017.


Best Sellers


Product Details
  • ISBN-13: 9780321712332
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Addison-Wesley Educational Publishers Inc
  • Height: 234 mm
  • No of Pages: 1440
  • Spine Width: 50 mm
  • Weight: 160 gr
  • ISBN-10: 0321712331
  • Publisher Date: 19 Oct 2018
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Sub Title: Art and Science
  • Width: 195 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Computer Security: Art and Science
Pearson Education (US) -
Computer Security: Art and Science
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Computer Security: Art and Science

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!