HOME > 상세정보

상세정보

Computer system and network security

Computer system and network security (2회 대출)

자료유형
단행본
개인저자
White, Gregory W. Risch, Eric A. Pooch, Udo W, 1944-.
서명 / 저자사항
Computer system and network security / Gregory B. White, Eric A. Fisch, Udo W. Pooch.
발행사항
Boca Raton :   CRC Press,   c1996.  
형태사항
296 p. : ill. ; 27 cm.
총서사항
CRC Press computer engineering series
ISBN
0849371791 (hardcover : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security. Computer networks --Security measures.
000 00000cam u2200205 a 4500
001 000045114700
005 20150708152735
008 950522s1996 flua b 001 0 eng
010 ▼a 95004905
020 ▼a 0849371791 (hardcover : alk. paper)
035 ▼a KRIC00267390
040 ▼a 211032 ▼c 211032 ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b W45 1996
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b W584c
100 1 ▼a White, Gregory W.
245 1 0 ▼a Computer system and network security / ▼c Gregory B. White, Eric A. Fisch, Udo W. Pooch.
260 ▼a Boca Raton : ▼b CRC Press, ▼c c1996.
300 ▼a 296 p. : ▼b ill. ; ▼c 27 cm.
490 1 ▼a CRC Press computer engineering series
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Risch, Eric A.
700 1 ▼a Pooch, Udo W, ▼d 1944-.
830 0 ▼a CRC Press computer engineering series.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 W584c 등록번호 121096652 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

(Note: Most chapters include a summary, exercises, references, and an extended bibliography)
Computer Security Fundamentals
Objectives of Computer Security
Issues Involved in Computer Security
Privacy and Ethics
Risk Analysis
Theory
Possible Loss (L)
Probability of Loss Occurrence (P)
Burden of Preventing Loss (B)
Applying the Risk Analysis Equation
Risk Analysis in Computer Security
Terminology
Application
Developing Secure Computer Systems
External Security Measures
Structure of a Computer System
Secure Computer System Issues
Security Models
Specification and Verification
Security Models
Bell and LaPadula
Clark-Wilson
Goguen-Meseguer
TCSEC
Discretionary Access Requirements
Mandatory Access Requirements
User Authentication
Authentication Objectives
Authentication Methods
Informational Keys
Physical Keys
Biometric Keys
Access and Information Flow Controls
File Passwords
Capabilities Based
Access Control Lists
Protection Bits
Controls for Mandatory Access
Trojan Horses
AUDITING and INTRUSION DETECTION
Audit Trail Features
Intrusion Detection Systems
User Profiling
Intruder Profiling
Signature Analysis
Action Based
IDES
MIDAS
Haystack
Network Intrusion Detection
Network Attack Characteristics
NSM
DIDS
NADIR
CSM
Monitoring and the Law
Damage Control and Assessment
Damage Control
Inform the Authorities
Backup System Data
Remove the Intruder
Contain and Monitor the Intruder
Lock Stolen Accounts
Require Additional Authentication
Damage Assessment
Attack Recovery
Damage Prevention
Network Security
Network Fundamentals
Network Security Issues
Basic Network Security Objectives and Threats
Security Services
The Trusted Network Interpretation
TNI Security Service
AIS Interconnection Issues
Distributed Systems Security
Firewalls
Simple Damage Limiting Approaches
Network Firewalls
Packet Filtering Gateways
Circuit Level Gateways
Application Level Gateways
Firewall Costs and Effectiveness
Database Security
Database Management System Primer
DBMS Vulnerabilities and Responses
Inference
Aggregation
Data Integrity
Trojan Horses
Cryptography
Substitution Ciphers
Caesar Cipher
ROT13
Substitution Cipher Variations
Vigenere Ciphers
One Time Pads
Transposition Ciphers
Encrypting Digital Communication
DES
IDEA
Key Escrow
Public Key Cryptography
Digital Signatures
Malicious Software
Viruses
Worms
Trojan Horses
Time Bombs
Security Standards
The Federal Criteria
The Common Criteria
The Trusted Computer System Evaluation Criteria
The Information Technology Security Evaluation Criteria
Case Study
The Hannover Hackers
An Evening With Berferd
The Internet Worm
Appendix: Information Warfare


정보제공 : Aladin

관련분야 신착자료