We recommend using a modern web browser such as Google Chrome or Microsoft Edge with their default settings.
READING ON THE GO AT UNION STATION LENDING LIBRARY
In the spring of 2015, The Union Station Redevelopment Corporation launched a […]
Matthew A. Bishop
Hello, I'm an eBook!
ATTENTION: This item is an eBook. It can be read on iOS, Android, MAC and PC's with a supported eReader. It is not a physical book. eBooks are available via download immediately after you've checked out.
Used Very Good
Converts one physical book into a digital version.
eDelivery converts your used book order into a digital version readable on most devices.
Ships directly from Better World Books
"This is an excellent text that should be read by every computer security professional and student." --Dick Kemmerer, University of California, Santa Barbara.
"This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!" --Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA
This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science.
"Computer Security: Art and Science" includes detailed discussions on: The nature and challenges of computer securityThe relationship between policy and security The role and application of cryptography The mechanisms used to implement policies Methodologies and technologies for assuranceVulnerability analysis and intrusion detection
"Computer Security "discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs.
This important work is essential for anyone who needs to understand, implement, or maintain a secure network or computer system. 0201440997B10252002
Come shop our entire inventory of used books. Get discount code »
Gift Certificate = Happy Friend + Books donated to families in need. Make Someone Happy »
We match every book you purchase with a book donation. Learn more »
Sign up now to get news, sales and special promotions!
© Better World Books (BetterWorldBooks.com)