Security in Computing Systems: Challenges, Approaches and Solutions
Autor Joachim Biskupen Limba Engleză Hardback – 18 noi 2008
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 945.17 lei 43-57 zile | |
Springer Berlin, Heidelberg – 19 oct 2010 | 945.17 lei 43-57 zile | |
Hardback (1) | 957.54 lei 43-57 zile | |
Springer Berlin, Heidelberg – 18 noi 2008 | 957.54 lei 43-57 zile |
Preț: 957.54 lei
Preț vechi: 1167.73 lei
-18% Nou
Puncte Express: 1436
Preț estimativ în valută:
183.25€ • 190.35$ • 152.22£
183.25€ • 190.35$ • 152.22£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540784418
ISBN-10: 3540784411
Pagini: 724
Ilustrații: XXVIII, 694 p.
Dimensiuni: 155 x 235 x 44 mm
Greutate: 1.36 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540784411
Pagini: 724
Ilustrații: XXVIII, 694 p.
Dimensiuni: 155 x 235 x 44 mm
Greutate: 1.36 kg
Ediția:2009
Editura: Springer Berlin, Heidelberg
Colecția Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Challenges and Basic Approaches.- Fundamental Challenges.- Computing Systems and Their Basic Vulnerabilities.- Fundamentals of Information Flow and Inference Control.- Messages, Inferences, Information and Knowledge.- Preventive Inference Control.- Security Mechanisms.- Key Ideas and Examples.- Combined Techniques.- Techniques of Control and Monitoring: Essentials.- Conceptual Access Rights.- Elements of a Security Architecture.- Monitoring and Intrusion Detection.- Techniques of Cryptography: Essentials.- Encryption.- Authentication.- Anonymization.- Some Further Cryptographic Protocols.- Implementations.- Design of Selected Systems.
Notă biografică
Joachim Biskup has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim and University of Dortmund again. He has done research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security. He served on the program committees of many international conferences, including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Database and Applications Security.
Textul de pe ultima copertă
With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks.
He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP.
Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.
He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP.
Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing.
Caracteristici
Broad and comprehensive coverage of all issues related to computer security Presents both informal surveys as well as rigorous formalizations when necessary Includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP Includes supplementary material: sn.pub/extras