MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
080320s2008 njua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2007032843 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0321434838 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780321434838 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u252 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Smith, Sean W., |
| Dates associated with a name |
1964- |
| 9 (RLIN) |
4700 |
| 245 14 - TITLE STATEMENT |
| Title |
The craft of system security / |
| Statement of responsibility, etc. |
Sean Smith, John Marchesini. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Upper Saddle River, NJ : |
| Name of publisher, distributor, etc. |
Addison-Wesley, |
| Date of publication, distribution, etc. |
c2008. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxxiii, 557 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references (p. 503-524) and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Preface -- Acknowledgments -- History -- Introduction -- The Standard Rubric -- The Matrix -- Other Views -- Safe States and the Access Control Matrix -- Other Hard Questions -- The Take-Home Message -- Project Ideas -- The Old Testament -- The Basic Framework -- Security Models -- The Orange Book -- INFOSEC, OPSEC, JOBSEC -- The Take-Home Message -- Project Ideas -- Old Principles, New World -- Solving the Wrong Problem? -- Lack of Follow-Through? -- Too Unwieldy? -- Saltzer and Schroeder -- Modern Relevance -- The Take-Home Messagev57 -- Project Ideas -- -- OS Security -- OS Background -- OS Security Primitives and Principles -- Real OSes: Everything but the Kitchen Sink -- When the Foundation Cracks -- Where Are We? -- The Take-Home Message -- Project Ideas -- Network Security -- Basic Framework -- Protocols -- The Network as a Battlefield -- The Brave New World -- The Take-Home Message -- Project Ideas -- Implementation Security -- Buffer Overflow -- Argument Validation and Other Mishaps -- TOCTOU -- Malware -- Programming Language Security -- Security in the Development Lifecycle -- The Take-Home Message -- Project Ideas -- -- Using Cryptography -- Framework and Terminology -- Randomness -- Symmetric Cryptography -- Applications of Symmetric Cryptography -- Public-Key Cryptography -- Hash Functions -- Practical Issues: Public Key -- Past and Future -- The Take-Home Message -- Project Ideas -- Subverting Cryptography -- Breaking Symmetric Key without Brute Force -- Breaking Symmetric Key with Brute Force -- Breaking Public Key without Factoring -- Breaking Cryptography via the Real World -- The Potential of Efficiently Factoring Moduli -- The Take-Home Message -- Project Ideas -- Authentication -- Basic Framework -- Authenticating Humans -- Human Factors -- From the Machine's Point of View -- Advanced Approaches -- Case Studies -- Broader Issues -- The Take-Home Message -- Project Ideas -- Public Key Infrastructure -- Basic Definitions -- Basic Structure -- Complexity Arrives -- Multiple CAs -- Revocation -- The X.509 World -- Dissent -- Ongoing Trouble -- The Take-Home Message -- Project Ideas -- Standards, Compliance, and Testing -- Standards -- Policy Compliance -- Testing -- The Take-Home Message -- Project Ideas -- -- The Web and Security -- Basic Structure -- Security Techniques -- Privacy Issues -- Web Services -- The Take-Home Message -- Project Ideas -- Office Tools and Security -- Word -- Lotus 1-2-3 -- PDF -- Cut-and-Paste -- PKI and Office Tools -- Mental Models -- The Take-Home Message -- Project Ideas -- Money, Time, Property -- Money -- Time -- Property -- The Take-Home Message -- Project Ideas -- Formal Methods and Security -- Specification -- Logics -- Cranking the Handle -- Case Studies -- Spinning Your Bank Account -- Limits -- The Take-Home Message -- Project Ideas. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding today's systems and vulnerabilities. Next, they systematically introduce the basic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security. |
| 596 ## - |
| -- |
1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
CIT. |
| 9 (RLIN) |
14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
4701 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
System design. |
| 9 (RLIN) |
64 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer networks |
| General subdivision |
Security measures. |
| 9 (RLIN) |
4702 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Marchesini, John. |
| 9 (RLIN) |
4703 |