TY - BOOK ID - 30522776 TI - Computer security PY - 2011 SN - 9780470741153 0470741155 PB - Chichester Wiley DB - UniCat KW - 681.3*D46 KW - 681.3*K65 KW - 681.3*D46 Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) KW - Security and protection: access controls authentication cryptographic controls information flow controls security kernels verification (Operating systems) KW - Security and protection: authentication insurance invasive software (e.g. viruses, worms, Trojan horses) physical security unauthorized access (e.g. hacking, phreaking) KW - Computer security KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) KW - Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) KW - Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) KW - Protection KW - Security measures UR - https://www.unicat.be/uniCat?func=search&query=sysid:30522776 AB - This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment. ER -