Computer security: art and science
In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security,...
Saved in:
Main Authors: | , , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Boston
Addison-Wesley
[2019]
Boston Pearson [2019] |
Edition: | Second edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780134097145/?ar |
Summary: | In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. -- Provided by publisher. |
Item Description: | Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed January 11, 2019) |
Physical Description: | 1 online resource (1 volume) illustrations |
ISBN: | 9780134097145 0134097149 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047443006 | ||
003 | DE-627-1 | ||
005 | 20240228120631.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2019 xx |||||o 00| ||eng c | ||
020 | |a 9780134097145 |9 978-0-13-409714-5 | ||
020 | |a 0134097149 |9 0-13-409714-9 | ||
035 | |a (DE-627-1)047443006 | ||
035 | |a (DE-599)KEP047443006 | ||
035 | |a (ORHE)9780134097145 | ||
035 | |a (DE-627-1)047443006 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 21/eng/20230216 | |
100 | 1 | |a Bishop, Matt |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Computer security |b art and science |c Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel |
250 | |a Second edition. | ||
264 | 1 | |a Boston |b Addison-Wesley |c [2019] | |
264 | 1 | |a Boston |b Pearson |c [2019] | |
264 | 4 | |c ©2019 | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed January 11, 2019) | ||
520 | |a In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. -- Provided by publisher. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Sullivan, Elisabeth |e VerfasserIn |4 aut | |
700 | 1 | |a Ruppel, Michelle |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780134097145/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047443006 |
---|---|
_version_ | 1833357107848544256 |
adam_text | |
any_adam_object | |
author | Bishop, Matt Sullivan, Elisabeth Ruppel, Michelle |
author_facet | Bishop, Matt Sullivan, Elisabeth Ruppel, Michelle |
author_role | aut aut aut |
author_sort | Bishop, Matt |
author_variant | m b mb e s es m r mr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047443006 (DE-599)KEP047443006 (ORHE)9780134097145 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02982cam a22004932c 4500</leader><controlfield tag="001">ZDB-30-ORH-047443006</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120631.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780134097145</subfield><subfield code="9">978-0-13-409714-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0134097149</subfield><subfield code="9">0-13-409714-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047443006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047443006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780134097145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047443006</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bishop, Matt</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="b">art and science</subfield><subfield code="c">Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed January 11, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. -- Provided by publisher.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sullivan, Elisabeth</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ruppel, Michelle</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780134097145/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047443006 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:26Z |
institution | BVB |
isbn | 9780134097145 0134097149 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Addison-Wesley Pearson |
record_format | marc |
spelling | Bishop, Matt VerfasserIn aut Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel Second edition. Boston Addison-Wesley [2019] Boston Pearson [2019] ©2019 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from title page (Safari, viewed January 11, 2019) In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication. Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis. This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise. -- Provided by publisher. Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Sullivan, Elisabeth VerfasserIn aut Ruppel, Michelle VerfasserIn aut |
spellingShingle | Bishop, Matt Sullivan, Elisabeth Ruppel, Michelle Computer security art and science Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | Computer security art and science |
title_auth | Computer security art and science |
title_exact_search | Computer security art and science |
title_full | Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel |
title_fullStr | Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel |
title_full_unstemmed | Computer security art and science Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel |
title_short | Computer security |
title_sort | computer security art and science |
title_sub | art and science |
topic | Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT bishopmatt computersecurityartandscience AT sullivanelisabeth computersecurityartandscience AT ruppelmichelle computersecurityartandscience |