The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. Comprehensive in scope, this book covers applied and practical elements, theory, and the reasons for the design of applications and security techniques.For example, if proprietary documents were given to a university, the policy of confidentiality in the corporation would conflict ... Detection mechanisms accept that an attack will occur; the goal is to determine that an attack is underway, or has occurred, and report it. ... The first is to stop an attack and to assess and repair anyanbsp;...
|Publisher||:||Addison-Wesley Professional - 2003|