Security in computing systems : (Record no. 315)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090330s2009 gw a b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2008937819 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783540784418 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u1281 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 21 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Biskup, Joachim. |
| 9 (RLIN) | 1127 |
| 245 10 - TITLE STATEMENT | |
| Title | Security in computing systems : |
| Remainder of title | challenges, approaches and solutions / |
| Statement of responsibility, etc. | Joachim Biskup. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Heidelberg : |
| Name of publisher, distributor, etc. | Springer, |
| Date of publication, distribution, etc. | c2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxvii, 694 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references (p. 643-668) and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Challenges and Basic Approaches -- Introduction -- Fundamental Challenges -- Computing Systems and their Basic Vulnerabilities -- Fundamentals of Information Flow and Inference Control -- Messages, Inferences, Information and Knowledge -- Preventive Inference Control -- Security Mechanisms -- Key Ideas and Examples -- Combined Techniques -- Techniques of Control and Monitoring -- Conceptual Access Rights -- Elements of a Security Architecture -- Monitoring and Intrusion Detection -- Techniques of Cryptography -- Encryption -- Authentication -- Anonymization -- Some Further Cryptographic Protocols -- Implementations -- Design of Selected Systems -- Appendix -- References -- Index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | With Security in Computing Systems, Joachim Biskup introduces, surveys and assesses the fundamentals of security with respect to all activities that individuals or groups directly or indirectly perform by means of computers and computer networks. He has organized his comprehensive overview on multilateral security into four cross-referencing parts: challenges and basic approaches; fundamentals of information flow and inference control; security mechanisms with an emphasis on control and monitoring on the one hand and on cryptography on the other; and implementations. Besides presenting informal surveys and introductions to these topics, the book carefully elaborates the fundamental ideas by at least partially explaining the required precise formalizations and outlining the achieved mathematical verifications. Moreover, the need to employ the various security enforcement methods in a well-coordinated way is emphasized and thoroughly exemplified, and this includes case studies on UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP. Overall, this monograph provides a broad and comprehensive description of computer security threats and countermeasures, ideal for graduate students or researchers in academia and industry who require an introduction to the state of the art in this field. In addition, it can be used as the basis for graduate courses on security issues in computing. |
| 596 ## - | |
| -- | 1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | CIT. |
| 9 (RLIN) | 14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 1128 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | AHRA-P | 005.8 / BI.S 2009 | 002919 | 11/24/2019 | 1 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | BAC_P | 005.8 / BI.S 2009 | 001760 | 11/24/2019 | 2 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / BI.S 2009 | 001955 | 11/24/2019 | 3 | 11/24/2019 | Books |