Description
A Comprehensive Solution Manual for Introduction to Computer Security By Matt Bishop, University of California – Davis
1. An Overview of Computer Security.
2. Access Control Matrix.
3. Foundational Results.
4. Security Policies.
5. Confidentiality Policies.
6. Integrity Policies.
7. Hybrid Policies.
8. Basic Cryptography.
9. Key Management.
10. Cipher Techniques.
11. Authentication.
12. Design Principles.
13. Representing Identity.
14. Access Control Mechanisms.
15. Information Flow.
16. Confinement Problem.
17. Introduction to Assurance.
18. Evaluating Systems.
19. Malicious Logic.
20. Vulnerability Analysis.
21. Auditing.
22. Intrusion Detection.
23. Network Security.
24. System Security.
25. User Security.
26. Program Security.
27. Lattices.
28. The Extended Euclidean Algorithm.
29. Virtual Machines.
Reviews
There are no reviews yet.