| 000 | 01824cam a2200385 i 4500 | ||
|---|---|---|---|
| 999 |
_c200436364 _d54576 |
||
| 001 | 200436364 | ||
| 003 | TR-AnTOB | ||
| 005 | 20190916174056.0 | ||
| 007 | ta | ||
| 008 | 040812t20052005maua b 001 0 eng | ||
| 010 | _a2004019195 | ||
| 020 | _a0321247442 (hardcover : alk. paper) | ||
| 020 | _a9780321247445 hardcover : alk. paper) | ||
| 035 | _a(TR-AnTOB)200436364 | ||
| 040 |
_aDLC _beng _erda _cDLC _dYDX _dUKM _dOCL _dUtOrBLW _dTR-AnTOB |
||
| 041 | 0 | _aeng | |
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bB563 2005 |
| 090 |
_aQA76.9.A25 _bB563 2005 |
||
| 100 | 1 |
_aBishop, Matt _q(Matthew A.) _eauthor _95989 |
|
| 245 | 1 | 0 |
_aIntroduction to computer security / _cMatt Bishop |
| 264 | 1 |
_aBoston : _bAddison-Wesley, _c[2005] |
|
| 264 | 4 | _c©2005 | |
| 300 |
_axxxii, 747 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index | ||
| 505 | _aPreface -- An Overview of Computer Security -- Access Control Matrix -- Foundational Results -- Security Policies -- Confidentiality Politices -- Integrity Policies -- Hybrid Policies -- Basic Cryptography -- Key Management -- Clipher Techniques -- Authentication -- Design Principles -- Representing Identity -- Access Control Mechanisms -- Information Flow -- Confinement Problem -- Introduction to Assurance -- Evaluating Systems -- Mallicious Logic -- Vulnerability Analysis -- Auditing -- Intrusion Detection -- Network Security -- System sEcurity -- User Security -- Program Security -- Lattices -- The Extended Euclidean Algorithm -- Virtual Machines. | ||
| 590 | _aDonated by Kemal Bıçakcı | ||
| 650 | 0 |
_aComputer security _9912 |
|
| 942 |
_2lcc _cBK |
||