SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.
Also available in other formats.
This is the Rough Cut version of the printed book.
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples
In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition’s publication.
Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.
This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise.
Preface
Acknowledgments
About the Author
Part I: Introduction
Chapter 1: An Overview of Computer Security
Part II: Foundations
Chapter 2: Access Control Matrix
Chapter 3: Foundational Results
Part III: Policy
Chapter 4: Security Policies
Chapter 5: Confidentiality Policies
Chapter 6: Integrity Policies
Chapter 7: Availability Policies
Chapter 8: Hybrid Policies
Chapter 9: Noninterference and Policy Composition
Part IV: Implementation I: Cryptography
Chapter 10: Basic Cryptography
Chapter 11: Key Management
Chapter 12: Cipher Techniques
Chapter 13: Authentication
Part V: Implementation II: Systems
Chapter 14: Design Principles
Chapter 15: Representing Identity
Chapter 16: Access Control Mechanisms
Chapter 17: Information Flow
Chapter 18: Confinement Problem
Part VI: Assurance
Chapter 19: Introduction to Assurance
Chapter 20: Building Systems with Assurance
Chapter 21: Formal Methods
Chapter 22: Evaluating Systems
Part VII: Special Topics
Chapter 23: Malware
Chapter 24: Vulnerability Analysis
Chapter 25: Auditing
Chapter 26: Intrusion Detection
Chapter 27: Attacks and Responses
Part VIII: Practicum
Chapter 28: Network Security
Chapter 29: System Security
Chapter 30: User Security
Chapter 31: Program Security
Part IX: Appendices
Appendix A: Lattices
Appendix B: The Extended Euclidean Algorithm
Appendix C: Entropy and Uncertainty
Appendix D: Virtual Machines
Appendix E: Symbolic Logic
Appendix F: The Encryption Standards
Appendix G: Example Academic Security Policy
Appendix H: Programming Rules
References
Index