ISBN13: | 9781032921310 |
ISBN10: | 1032921315 |
Kötéstípus: | Puhakötés |
Terjedelem: | 352 oldal |
Méret: | 234x156 mm |
Súly: | 648 g |
Nyelv: | angol |
Illusztrációk: | 93 Illustrations, black & white |
687 |
A matematika alapjai, matematikai logika
Kombinatorika és gráfelmélet
A számítástudomány elmélete, a számítástechnika általában
Adatkezelés a számítógépes rendszerekben
Adatvédelem, adatbiztonság
A számítástechnika biztonsági és egészségügyi vonatkozásai
Diszkrét matematika
A matematika alapjai, matematikai logika (karitatív célú kampány)
Kombinatorika és gráfelmélet (karitatív célú kampány)
A számítástudomány elmélete, a számítástechnika általában (karitatív célú kampány)
Adatkezelés a számítógépes rendszerekben (karitatív célú kampány)
Adatvédelem, adatbiztonság (karitatív célú kampány)
A számítástechnika biztonsági és egészségügyi vonatkozásai (karitatív célú kampány)
Diszkrét matematika (karitatív célú kampány)
Access Control, Security, and Trust
GBP 56.99
Kattintson ide a feliratkozáshoz
A Prosperónál jelenleg nincsen raktáron.
This book equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and a
Developed from the authors? courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.
The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.
Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.
Focusing on the logic of access control, more than on actual computer programming, this volume is designed as a textbook for undergraduates. Each chapter ends with exercises and a concise description of expected learning outcomes. The authors, both in electrical engineering and computer science at Syracuse University, also teach an intensive summer course on access control for hundreds of ROTC cadets. It contains a useful selection of tables and figures, a notation index and a brief bibliography.
?SciTech Book News, February 2011
Preliminaries. Distributed Access Control. Isolation and Sharing. Access Policies. Appendix. Index.