Computer Security: Art and Science 计算机安全:艺术与科学 PDF版

4星(超过85%的资源)
所需积分/C币:50 2014-03-02 16:15:23 9.16MB PDF
127
收藏 收藏
举报

本书详尽地介绍了计算机安全的理论与实践,阐释了该领域最基本和最普遍的知识,包括计算机安全的本质和面临的挑战,策略与安全的关系,密码学的角色与应用,策略实现机制,保障技术和方法学,脆弱性分析和入侵检测等。同时把计算机系统、网络、人为因素和密码学等概念融为一体,本书可作为信息安全、计算机等相关专业本科生、研究生的教科书和学习参考书,也可作为维护网络和计算机系统安全的管理人员、信息安全技术开发人员的工具书和参考书。 The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies. Preface Goals Philosophy Organization Roadmap Dependencies Background UndergraduateLevel GraduateLevel Practitioners SpecialAcknowledgment Acknowledgments PART1:INTRODUCTION ChapterIAnOverviewofComputerSecurity 1.1TheBasicComponents 1.2Threats 1.3PolicyandMechanism 1.4AssumptionsandTrust 1.5Assurance 1.6OperationalIssues 1.7HumanIssues 1.8TyingItAllTogether 1.9Summary 1.10ResearchIssues 1.11FurtherReading 1.12Exercises PART2:FOUNDATIONS Chapter2AccessControlMatrix 2.1ProtectionState 2.2AccessControlMatrixModel 2.3ProtectionStateTransitions 2.4Copying,Owning,andtheAttenuationofPrivilege 2.5Summary 2.6ResearchIssues 2.7FurtherReading 2.8Exercises Chapter3FoundationalResults 3.1TheGeneralQuestion 3.2BasicResults 3.3TheTake-GrantP

...展开详情
立即下载 身份认证后 购VIP低至7折
一个资源只可评论一次,评论内容不能少于5个字
zhqldong 非常不错的文章。特别是指出BLP模型问题的一章,该内容被很多安全类书籍忽略了。
2019-01-01
回复
Jamlys 不好不好不好不好,乱码看着炒鸡难受,居然还要30积分,就是骗积分吧?
2018-09-07
回复
sunsuper2011 很好,课上老师指定的教材
2018-03-22
回复
从此不纠结技术 原价1000多 这积分我给了
2017-08-18
回复
zhzm1101 英文原版,是转换而来的,还不错
2017-02-22
回复
blue2014sky 经典书籍。中文译本。完整目录。
2016-12-12
回复
xumesang 英文版,非常值得推荐的一本书
2016-10-22
回复
hkhk366 正是我需要的,可以用,谢谢
2016-10-02
回复
sheilahong2000 好书。 很经典。 对我研究数据分析在网络安全上的应用很有帮助。
2016-08-08
回复
morning0070 很经典,不错,谢谢楼主
2016-05-30
回复
您会向同学/朋友/同事推荐我们的CSDN下载吗?
谢谢参与!您的真实评价是我们改进的动力~
上传资源赚钱or赚积分
最新推荐
Computer Security: Art and Science 计算机安全:艺术与科学 PDF版 50积分/C币 立即下载
1/0