000 01824cam a2200385 i 4500
999 _c200436364
_d54576
001 200436364
003 TR-AnTOB
005 20190916174056.0
007 ta
008 040812t20052005maua b 001 0 eng
010 _a2004019195
020 _a0321247442 (hardcover : alk. paper)
020 _a9780321247445 hardcover : alk. paper)
035 _a(TR-AnTOB)200436364
040 _aDLC
_beng
_erda
_cDLC
_dYDX
_dUKM
_dOCL
_dUtOrBLW
_dTR-AnTOB
041 0 _aeng
042 _apcc
050 0 0 _aQA76.9.A25
_bB563 2005
090 _aQA76.9.A25
_bB563 2005
100 1 _aBishop, Matt
_q(Matthew A.)
_eauthor
_95989
245 1 0 _aIntroduction to computer security /
_cMatt Bishop
264 1 _aBoston :
_bAddison-Wesley,
_c[2005]
264 4 _c©2005
300 _axxxii, 747 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index
505 _aPreface -- An Overview of Computer Security -- Access Control Matrix -- Foundational Results -- Security Policies -- Confidentiality Politices -- Integrity Policies -- Hybrid Policies -- Basic Cryptography -- Key Management -- Clipher Techniques -- Authentication -- Design Principles -- Representing Identity -- Access Control Mechanisms -- Information Flow -- Confinement Problem -- Introduction to Assurance -- Evaluating Systems -- Mallicious Logic -- Vulnerability Analysis -- Auditing -- Intrusion Detection -- Network Security -- System sEcurity -- User Security -- Program Security -- Lattices -- The Extended Euclidean Algorithm -- Virtual Machines.
590 _aDonated by Kemal Bıçakcı
650 0 _aComputer security
_9912
942 _2lcc
_cBK