没有合适的资源?快使用搜索试试~ 我知道了~
首页Computer security: Art and Science
Computer security: Art and Science
需积分: 15 154 浏览量
更新于2023-03-16
评论 1
收藏 19.67MB PDF 举报
Computer security: Art and Science 经典信息安全书籍,有关密码学,系统安全,网络安全。国外大学信息安全课程要求必读书籍。
资源详情
资源评论
资源推荐

• Table of Contents
Computer Security: Art and Science
By Matt Bishop
Publisher: Addison Wesley
Pub Date: November 29, 2002
ISBN: 0-201-44099-7
Pages: 1136
"This is an excellent text that should be read by every computer security professional and student."
—Dick Kemmerer, University of California, Santa Barbara.
"This is the most complete book on information security theory, technology, and practice that I have encountered

"This is the most complete book on information security theory, technology, and practice that I have encountered
anywhere!"
—Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA
This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive
text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable
information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates
concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively
demonstrates that computer security is an art as well as a science.
Computer Security: Art and Science includes detailed discussions on:
The nature and challenges of computer security
The relationship between policy and security
The role and application of cryptography
The mechanisms used to implement policies
Methodologies and technologies for assurance
Vulnerability analysis and intrusion detection
Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these
policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with
networks and moving on to systems, users, and programs.
This important work is essential for anyone who needs to understand, implement, or maintain a secure network or
computer system.

•
Table of
Contents
Computer Security: Art and Science
By Matt Bishop
Publisher: Addison Wesley
Pub Date: November 29, 2002
ISBN: 0-201-44099-7
Pages: 1136
Copyright
Preface
Goals
Philosophy
Organization
Roadmap
Special Acknowledgment
Acknowledgments
Part 1. Introduction
Chapter 1. An Overview of Computer Security
Section 1.1. The Basic Components
Section 1.2. Threats
Section 1.3. Policy and Mechanism
Section 1.4. Assumptions and Trust
Section 1.5. Assurance
Section 1.6. Operational Issues
Section 1.7. Human Issues
Section 1.8. Tying It All Together
Section 1.9. Summary
Section 1.10. Research Issues
Section 1.11. Further Reading
Section 1.12. Exercises
Part 2. Foundations
Chapter 2. Access Control Matrix
Section 2.1. Protection State
Section 2.2. Access Control Matrix Model
Section 2.3. Protection State Transitions
Section 2.4. Copying, Owning, and the Attenuation of Privilege
Section 2.5. Summary
Section 2.6. Research Issues
Section 2.7. Further Reading
Section 2.8. Exercises
Chapter 3. Foundational Results
Section 3.1. The General Question
Section 3.2. Basic Results
Section 3.3. The Take-Grant Protection Model
Section 3.4. Closing the Gap
Section 3.5. Expressive Power and the Models
Section 3.6. Summary

Section 3.7. Research Issues
Section 3.8. Further Reading
Section 3.9. Exercises
Part 3. Policy
Chapter 4. Security Policies
Section 4.1. Security Policies
Section 4.2. Types of Security Policies
Section 4.3. The Role of Trust
Section 4.4. Types of Access Control
Section 4.5. Policy Languages
Section 4.6. Example: Academic Computer Security Policy
Section 4.7. Security and Precision
Section 4.8. Summary
Section 4.9. Research Issues
Section 4.10. Further Reading
Section 4.11. Exercises
Chapter 5. Confidentiality Policies
Section 5.1. Goals of Confidentiality Policies
Section 5.2. The Bell-LaPadula Model
Section 5.3. Tranquility
Section 5.4. The Controversy over the Bell-LaPadula Model
Section 5.5. Summary
Section 5.6. Research Issues
Section 5.7. Further Reading
Section 5.8. Exercises
Chapter 6. Integrity Policies
Section 6.1. Goals
Section 6.2. Biba Integrity Model
Section 6.3. Lipner's Integrity Matrix Model
Section 6.4. Clark-Wilson Integrity Model
Section 6.5. Summary
Section 6.6. Research Issues
Section 6.7. Further Reading
Section 6.8. Exercises
Chapter 7. Hybrid Policies
Section 7.1. Chinese Wall Model
Section 7.2. Clinical Information Systems Security Policy
Section 7.3. Originator Controlled Access Control
Section 7.4. Role-Based Access Control
Section 7.5. Summary
Section 7.6. Research Issues
Section 7.7. Further Reading
Section 7.8. Exercises
Chapter 8. Noninterference and Policy Composition
Section 8.1. The Problem
Section 8.2. Deterministic Noninterference
Section 8.3. Nondeducibility
Section 8.4. Generalized Noninterference
Section 8.5. Restrictiveness

Section 8.6. Summary
Section 8.7. Research Issues
Section 8.8. Further Reading
Section 8.9. Exercises
Part 4. Implementation I: Cryptography
Chapter 9. Basic Cryptography
Section 9.1. What Is Cryptography?
Section 9.2. Classical Cryptosystems
Section 9.3. Public Key Cryptography
Section 9.4. Cryptographic Checksums
Section 9.5. Summary
Section 9.6. Research Issues
Section 9.7. Further Reading
Section 9.8. Exercises
Chapter 10. Key Management
Section 10.1. Session and Interchange Keys
Section 10.2. Key Exchange
Section 10.3. Key Generation
Section 10.4. Cryptographic Key Infrastructures
Section 10.5. Storing and Revoking Keys
Section 10.6. Digital Signatures
Section 10.7. Summary
Section 10.8. Research Issues
Section 10.9. Further Reading
Section 10.10. Exercises
Chapter 11. Cipher Techniques
Section 11.1. Problems
Section 11.2. Stream and Block Ciphers
Section 11.3. Networks and Cryptography
Section 11.4. Example Protocols
Section 11.5. Summary
Section 11.6. Research Issues
Section 11.7. Further Reading
Section 11.8. Exercises
Chapter 12. Authentication
Section 12.1. Authentication Basics
Section 12.2. Passwords
Section 12.3. Challenge-Response
Section 12.4. Biometrics
Section 12.5. Location
Section 12.6. Multiple Methods
Section 12.7. Summary
Section 12.8. Research Issues
Section 12.9. Further Reading
Section 12.10. Exercises
Part 5. Implementation II: Systems
Chapter 13. Design Principles
Section 13.1. Overview
剩余927页未读,继续阅读












安全验证
文档复制为VIP权益,开通VIP直接复制

评论0