当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Security in Computing Systems: Challenges, Approaches and Solutions

Security in Computing Systems: Challenges, Approaches and Solutions

书名:Security in Computing Systems: Challenges, Approaches and Solutions

上传:石头

时间:2009-12-21

文件大小:4.65 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Joachim Biskup
出版日期:December 5, 2008
出版社:其它
页数:694
ISBN:ISBN-10: 3540784411 ISBN-13: 978-3540784418
文件格式:PDF

Product Description
With Security in Computing Systems,Joachim Biskup introduces, surveys and assesses the fundamentals ofsecurity with respect to all activities that individuals or groupsdirectly or indirectly perform by means of computers and computernetworks.He has organized his comprehensive overview on multilateralsecurity into four cross-referencing parts: challenges and basicapproaches; fundamentals of information flow and inference control;security mechanisms with an emphasis on control and monitoring on theone hand and on cryptography on the other; and implementations. Besidespresenting informal surveys and introductions to these topics, the bookcarefully elaborates the fundamental ideas by at least partiallyexplaining the required precise formalizations and outlining theachieved mathematical verifications. Moreover, the need to employ thevarious security enforcement methods in a well-coordinated way isemphasized and thoroughly exemplified, and this includes case studieson UNIX, Oracle/SQL, CORBA, Kerberos, SPKI/SDSI and PGP.
Overall, this monograph provides a broad and comprehensivedescription of computer security threats and countermeasures, ideal forgraduate students or researchers in academia and industry who requirean introduction to the state of the art in this field. In addition, itcan be used as the basis for graduate courses on security issues incomputing.
About the Author
Joachim Biskup has been Professor of Computer Science since 1981 at theUniversity of Dortmund, University of Hildesheim and University ofDortmund again. He has done research in recursion and complexitytheory, information systems with an emphasis on database schema design,query optimization and mediation, and various aspects of security. Heserved on the program committees of many international conferences,including ICDT, FoIKS, ESORICS and IFIP WG 11.3 Conference on Databaseand Applications Security.
Tags:ApproachesChallengesComputingSecuritySolutions


相关书籍

  • Ubuntu on a Dime: The Path to Low-Cost Computing
  • Real 802.11 Security
  • Wireless Security Handbook
  • Java & XML, 2nd Edition: Solutions to Real-World Problems
  • Real 802.11 Security

评论 (0) All

登陆 | 还没注册?