Author(s) : Matt Bishop
Publisher : Addison Wesley
Year : Nov 2002
ISBN 10: 0201440997
ISBN 13: 9780201440997
Language : English
Pages : 1136
Filetype : CHM
Size : 2.6 MB
This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science.
Chapter 01 - An Overview of Computer Security
Chapter 02 - Access Control Matrix
Chapter 03 - Foundational Results
Chapter 04 - Security Policies
Chapter 05 - Confidentiality Policies
Chapter 06 - Integrity Policies
Chapter 07 - Hybrid Policies
Chapter 08 - Noninterference and Policy Composition
Chapter 09 - Basic Cryptography
Chapter 10 - Key Management
Chapter 11 - Cipher Techniques
Chapter 12 - Authentication
Chapter 13 - Design Principles
Chapter 14 - Representing Identity
Chapter 15 - Access Control Mechanisms
Chapter 16 - Information Flow
Chapter 17 - Confinement Problem
Chapter 18 - Introduction to Assurance
Chapter 19 - Building Systems with Assurance
Chapter 20 - Formal Methods
Chapter 21 - Evaluating Systems
Chapter 22 - Malicious Logic
Chapter 23 - Vulnerability Analysis
Chapter 24 - Auditing
Chapter 25 - Intrusion Detection
Chapter 26 - Network Security
Chapter 27 - System Security
Chapter 28 - User Security
Chapter 29 - Program Security
Chapter 30 - Lattices
Chapter 31 - The Extended Euclidean Algorithm
Chapter 32 - Entropy and Uncertainty
Chapter 33 - Virtual Machines
Chapter 34 - Symbolic Logic
Chapter 35 - Example Academic Security Policy
http://rapidshare.com/files/111469432/c
password:ganelon
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
▼
2009
(127)
- ► August 2009 (33)
-
▼
March 2009
(40)
- Web Dragons: Inside the Myths of Search Engine
- Mathematics for Algorithm and Systems Analysis
- Javascript The Definitive Guide 5th Edition
- Brute Force: Cracking the Data Encryption Standard
- Operating Systems Design and Implementation
- Access Denied
- Exploiting Software: How to Break Code
- The Ethical Hack: A Framework for Business Value
- Create your own linux distribution
- Fuzzing: Brute Force Vulnerability Discovery
- Principles of Computer Science
- Pro Decrypting VBScript Viruses
- Learn-Key's Hacking Revealed
- Hacking Exposed Wireless
- Assembly Language Step-By-Step
- Professional JavaScript for Web Developers
- Network Security Assessment
- Advanced Linux Programming
- Introduction to Computing and Programming wit Java
- Hacking the Cable Modem
- Hacking the Cable Modem
- Java Cryptography Extensions:Practical Guide
- Internet and the World Wide Web: How to Program
- IPSec, 2nd Edition
- Understanding the Linux Kernel
- Software Piracy Exposed
- Computer Security Art And Science
- Network Security: A Beginner's Guide
- Code Reading: The Open Source Perspective
- 5 C Programming eBooks
- The Invisible Web
- MYSQL Books
- Reverse Engineering Code with IDA Pro
- Forensic Computing A Practitioner’s Guide
- Network Security Tools
- XML Books
- Internet Denial of Service: Attack and Defense
- Practical Internet Security
- Ankit Fadia ebooks
- Offensive Security Tutorial Videos...zone
- ► February 2009 (17)
-
►
2008
(211)
- ► November 2008 (13)
- ► September 2008 (198)
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment