Anda belum login :: 26 Nov 2024 18:18 WIB
Home
|
Logon
Hidden
»
Administration
»
Collection Detail
Detail
Computer security : art and science
Bibliografi
Author:
Bishop, Matt
Topik:
Computer security
;
Computer networks--Security measures
;
Computer crimes
;
Computer viruses
;
Cyberterrorism
Bahasa:
(EN )
ISBN:
978-0-321-71233-2
Edisi:
2nd ed.
Penerbit:
Pearson Education
Tempat Terbit:
New York
Tahun Terbit:
2019
Jenis:
Books - E-Book
Fulltext:
Cover.pdf
(1.08MB;
0 download
)
Title Page.pdf
(44.03KB;
0 download
)
Copyrigt Page.pdf
(27.72KB;
0 download
)
Dedication.pdf
(22.08KB;
0 download
)
Contents.pdf
(155.39KB;
0 download
)
Preface.pdf
(113.58KB;
0 download
)
Preface to the First Edition.pdf
(106.7KB;
0 download
)
Acknowledgments.pdf
(66.99KB;
0 download
)
About the Author.pdf
(112.25KB;
0 download
)
Chapter 1-An Overview of Computer Security.pdf
(224.77KB;
0 download
)
Chapter 2-Access Control Matrix.pdf
(236.3KB;
0 download
)
Chapter 3-Foundational Results.pdf
(381.33KB;
0 download
)
Chapter 4-Security Policies.pdf
(262.13KB;
0 download
)
Chapter 5-Confidentiality Policies.pdf
(265.55KB;
0 download
)
Chapter 6-Integrity Policies.pdf
(233.65KB;
0 download
)
Chapter 7-Availability Policies.pdf
(220.63KB;
0 download
)
Chapter 8-Hybrid Policies.pdf
(227.6KB;
0 download
)
Chapter 9-Noninterference and Policy Composition.pdf
(252.63KB;
0 download
)
Chapter 10-Basic Cryptography.pdf
(396.18KB;
0 download
)
Chapter 11-Key Management.pdf
(256.96KB;
0 download
)
Chapter 12-Cipher Techniques.pdf
(826.46KB;
0 download
)
Chapter 13-Authentication.pdf
(247.87KB;
0 download
)
Chapter 14-Design Principles.pdf
(189.82KB;
0 download
)
Chapter 15-Representing Identity.pdf
(268.29KB;
0 download
)
Chapter 16-Access Control Mechanisms.pdf
(250.74KB;
0 download
)
Chapter 17-Information Flow.pdf
(287.72KB;
0 download
)
Chapter 18-Confinement Problem.pdf
(328.78KB;
0 download
)
Chapter 19-Introduction to Assurance.pdf
(188.7KB;
0 download
)
Chapter 20-Building Systems with Assurance.pdf
(272.18KB;
0 download
)
Chapter 21-Formal Methods.pdf
(212.5KB;
0 download
)
Chapter 22-Evaluating Systems.pdf
(255.82KB;
0 download
)
Chapter 23-Malware.pdf
(356.61KB;
0 download
)
Chapter 24-Vulnerability Analysis.pdf
(344.08KB;
0 download
)
Chapter 25-Auditing.pdf
(294.92KB;
0 download
)
Chapter 26-Intrusion Detection.pdf
(310.51KB;
0 download
)
Chapter 27-Attacks and Responses.pdf
(307.83KB;
0 download
)
Chapter 28-Network Security.pdf
(222.93KB;
0 download
)
Chapter 29-System Security.pdf
(229.76KB;
0 download
)
Chapter 30-User Security.pdf
(219.13KB;
0 download
)
Chapter 31-Program Security.pdf
(293.74KB;
0 download
)
Appendices.pdf
(1.11MB;
0 download
)
References.pdf
(520.84KB;
0 download
)
Index.pdf
(993.39KB;
0 download
)
Related courses
TPE 432 - SISTEM SEKURITI KOMPUTER (Bacaan Wajib)
Opini Anda
Klik untuk menuliskan opini Anda tentang koleksi ini!
Lihat Sejarah Pengadaan
Konversi Metadata
Kembali
Process time: 0.1875 second(s)