Computer Security : Art and Science
Matt Bishop
Vendido por AHA-BUCH GmbH, Einbeck, Alemania
Vendedor de AbeBooks desde 14 de agosto de 2006
Nuevos - Encuadernación de tapa dura
Condición: Nuevo
Cantidad disponible: 2 disponibles
Añadir al carritoVendido por AHA-BUCH GmbH, Einbeck, Alemania
Vendedor de AbeBooks desde 14 de agosto de 2006
Condición: Nuevo
Cantidad disponible: 2 disponibles
Añadir al carritoNeuware - The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and ExamplesIn this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition s publication.Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.Understand computer security goals, problems, and challenges, and the deep links between theory and practiceLearn how computer scientists seek to prove whether systems are secureDefine security policies for confidentiality, integrity, availability, and moreAnalyze policies to reflect core questions of trust, and use them to constrain operations and changeImplement cryptography as one component of a wider computer and network security strategyUse system-oriented techniques to establish effective security mechanisms, defining who can act and what they can doSet appropriate security goals for a system or product, and ascertain how well it meets themRecognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise.Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
N° de ref. del artículo 9780321712332
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples
In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication.
Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.
This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise.
Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Matt Bishop is a professor in the Department of Computer Science at the University of California at Davis. His main research interest is the analysis of vulnerabilities in computer systems, including modeling them, building tools to detect vulnerabilities, and ameliorating or eliminating them. He works in the areas of network security, including the study of denial of service attacks and defenses, policy modeling, software assurance testing, resilience, and formal modeling of access control. He was co-chair of the Joint Task Force that developed the Cybersecurity Curricula 2017: Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity, released in December 2017. He earned his Ph.D. in computer science from Purdue University in 1984.
"Sobre este título" puede pertenecer a otra edición de este libro.
Ver la página web de la librería
Términos y Condiciones Generales e Información del Cliente / Política de Privacidad
I. Términos y Condiciones Generales
§ 1 Disposiciones básicas
(1)Los siguientes términos y condiciones se aplican a todos los contratos que celebre con nosotros como proveedor (AHA-BUCH GmbH) a través de las plataformas de Internet AbeBooks y/o ZVAB. A menos que se acuerde lo contrario, se objetará la inclusión de cualquiera de sus propios términos y condiciones utilizados por usted.
(2)Un consumidor en el sentid...
Enviamos su pedido después de recibirlos
para artículos disponibles las últimas 24 horas,
para artículos con suministro nocturno a más tardar 48 horas.
En caso de que necesitemos pedir un artículo a nuestro proveedor, nuestro tiempo de envío depende de la fecha de recepción de los artículos, pero los artículos se enviarán el mismo día.
Nuestro objetivo es enviar los artículos pedidos de la manera más rápida, pero también más eficiente y segura a nuestros clientes.
| Cantidad del pedido | De 30 a 40 días hábiles | De 7 a 14 días hábiles |
|---|---|---|
| Primer artículo | EUR 70.06 | EUR 80.06 |
Los plazos de entrega los establecen los vendedores y varían según el transportista y la ubicación. Los pedidos que pasan por la aduana pueden sufrir retrasos y los compradores son responsables de los aranceles o tarifas asociadas. Los vendedores pueden ponerse en contacto con usted en relación con cargos adicionales para cubrir cualquier aumento en los costes de envío de los artículos.