Physical and digital books, media, journals, archives, and databases.
Results include
  1. Computer Security : Art and Science

    Bishop, Matthew A. (Matthew A.)
    Boston : Addison Wesley Professional, Dec. 2002 ; Old Tappan : Pearson Education [distributor]

    Annotation "This is an excellent text that should be read by every computer security professional and student."--Dick Kemmerer, University of California, Santa Barbara.
    "This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!" --Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA
    This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science. Computer Security: Art and Science includes detailed discussions on:

    • The nature and challenges of computer security
    • The relationship between policy and security
    • The role and application of cryptography
    • The mechanisms used to implement policies
    • Methodologies and technologies for assurance
    • Vulnerability analysis and intrusion detection
    Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs. This important work is essential for anyone who needs to understand, implement, or maintain a secure network or computer system.

    0201440997B10252002.The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

    Online Safari Books Online

  2. Computer security

    Gollmann, Dieter
    Chichester ; New York : Wiley, c1999.

    A comprehensive and practical text and the perfect starting point for this subject ...'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as: Should protection focus on data, operations or users? Whilst taking cast iron measures to build in security at one level, what does one do to prevent attackers gaining entry from a lower level? Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. It meets a real need for a comprehensive textbook on the subject. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.

  3. Computer security

    Carroll, John M. (John Millar), 1925-2011
    2nd ed. - Boston : Butterworths, ©1987.

    Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related crimes. Part II discusses the organizations and models for the protection of information. Part III talks about the physical security involved and access control involved in data protection. Part IV deals with the different measures employed to promote security in the communication between computers.

    Online ScienceDirect

Your search also found 1 topic specific databases.


Course- and topic-based guides to collections, tools, and services.
No guide results found... Try a different search

Library website

Library info; guides & content by subject specialists
No website results found... Try a different search


Digital showcases for research and teaching.
No exhibits results found... Try a different search


Geospatial content, including GIS datasets, digitized maps, and census data.
No earthworks results found... Try a different search

More search tools

Tools to help you discover resources at Stanford and beyond.