实例介绍
【实例简介】
【实例截图】
【核心代码】
Copyright Preface Goals Philosophy Organization Roadmap Special Acknowledgment Acknowledgments Part 1. Introduction Chapter 1. An Overview of Computer Security Section 1.1. The Basic Components Section 1.2. Threats Section 1.3. Policy and Mechanism Section 1.4. Assumptions and Trust Section 1.5. Assurance Section 1.6. Operational Issues Section 1.7. Human Issues Section 1.8. Tying It All Together Section 1.9. Summary Section 1.10. Research Issues Section 1.11. Further Reading Section 1.12. Exercises Part 2. Foundations Chapter 2. Access Control Matrix Section 2.1. Protection State Section 2.2. Access Control Matrix Model Section 2.3. Protection State Transitions Section 2.4. Copying, Owning, and the Attenuation of Privilege Section 2.5. Summary Section 2.6. Research Issues Section 2.7. Further Reading Section 2.8. Exercises Chapter 3. Foundational Results Section 3.1. The General Question Section 3.2. Basic Results Section 3.3. The Take-Grant Protection Model Section 3.4. Closing the Gap Section 3.5. Expressive Power and the Models Section 3.6. Summary Section 3.7. Research Issues Section 3.8. Further Reading Section 3.9. Exercises Part 3. Policy Chapter 4. Security Policies Section 4.1. Security Policies Section 4.2. Types of Security Policies Section 4.3. The Role of Trust Section 4.4. Types of Access Control Section 4.5. Policy Languages Section 4.6. Example: Academic Computer Security Policy Section 4.7. Security and Precision Section 4.8. Summary Section 4.9. Research Issues Section 4.10. Further Reading Section 4.11. Exercises Chapter 5. Confidentiality Policies Section 5.1. Goals of Confidentiality Policies Section 5.2. The Bell-LaPadula Model Section 5.3. Tranquility Section 5.4. The Controversy over the Bell-LaPadula Model Section 5.5. Summary Section 5.6. Research Issues Section 5.7. Further Reading Section 5.8. Exercises Chapter 6. Integrity Policies Section 6.1. Goals Section 6.2. Biba Integrity Model Section 6.3. Lipner's Integrity Matrix Model Section 6.4. Clark-Wilson Integrity Model Section 6.5. Summary Section 6.6. Research Issues Section 6.7. Further Reading Section 6.8. Exercises Chapter 7. Hybrid Policies Section 7.1. Chinese Wall Model Section 7.2. Clinical Information Systems Security Policy Section 7.3. Originator Controlled Access Control Section 7.4. Role-Based Access Control Section 7.5. Summary Section 7.6. Research Issues Section 7.7. Further Reading Section 7.8. Exercises Chapter 8. Noninterference and Policy Composition Section 8.1. The Problem Section 8.2. Deterministic Noninterference Section 8.3. Nondeducibility Section 8.4. Generalized Noninterference Section 8.5. Restrictiveness Section 8.6. Summary Section 8.7. Research Issues Section 8.8. Further Reading Section 8.9. Exercises Part 4. Implementation I: Cryptography Chapter 9. Basic Cryptography Section 9.1. What Is Cryptography? Section 9.2. Classical Cryptosystems Section 9.3. Public Key Cryptography Section 9.4. Cryptographic Checksums Section 9.5. Summary Section 9.6. Research Issues Section 9.7. Further Reading Section 9.8. Exercises Chapter 10. Key Management Section 10.1. Session and Interchange Keys Section 10.2. Key Exchange Section 10.3. Key Generation Section 10.4. Cryptographic Key Infrastructures Section 10.5. Storing and Revoking Keys Section 10.6. Digital Signatures Section 10.7. Summary Section 10.8. Research Issues Section 10.9. Further Reading Section 10.10. Exercises Chapter 11. Cipher Techniques Section 11.1. Problems Section 11.2. Stream and Block Ciphers Section 11.3. Networks and Cryptography Section 11.4. Example Protocols Section 11.5. Summary Section 11.6. Research Issues Section 11.7. Further Reading Section 11.8. Exercises Chapter 12. Authentication Section 12.1. Authentication Basics Section 12.2. Passwords Section 12.3. Challenge-Response Section 12.4. Biometrics Section 12.5. Location Section 12.6. Multiple Methods Section 12.7. Summary Section 12.8. Research Issues Section 12.9. Further Reading Section 12.10. Exercises Part 5. Implementation II: Systems Chapter 13. Design Principles Section 13.1. Overview Section 13.2. Design Principles Section 13.3. Summary Section 13.4. Research Issues Section 13.5. Further Reading Section 13.6. Exercises Chapter 14. Representing Identity Section 14.1. What Is Identity? Section 14.2. Files and Objects Section 14.3. Users Section 14.4. Groups and Roles Section 14.5. Naming and Certificates Section 14.6. Identity on the Web Section 14.7. Summary Section 14.8. Research Issues Section 14.9. Further Reading Section 14.10. Exercises Chapter 15. Access Control Mechanisms Section 15.1. Access Control Lists Section 15.2. Capabilities Section 15.3. Locks and Keys Section 15.4. Ring-Based Access Control Section 15.5. Propagated Access Control Lists Section 15.6. Summary Section 15.7. Research Issues Section 15.8. Further Reading Section 15.9. Exercises Chapter 16. Information Flow Section 16.1. Basics and Background Section 16.2. Nonlattice Information Flow Policies Section 16.3. Compiler-Based Mechanisms Section 16.4. Execution-Based Mechanisms Section 16.5. Example Information Flow Controls Section 16.6. Summary Section 16.7. Research Issues Section 16.8. Further Reading Section 16.9. Exercises Chapter 17. Confinement Problem Section 17.1. The Confinement Problem Section 17.2. Isolation Section 17.3. Covert Channels Section 17.4. Summary Section 17.5. Research Issues Section 17.6. Further Reading Section 17.7. Exercises Part 6. Assurance Chapter 18. Introduction to Assurance Section 18.1. Assurance and Trust Section 18.2. Building Secure and Trusted Systems Section 18.3. Summary Section 18.4. Research Issues Section 18.5. Further Reading Section 18.6. Exercises Chapter 19. Building Systems with Assurance Section 19.1. Assurance in Requirements Definition and Analysis Section 19.2. Assurance During System and Software Design Section 19.3. Assurance in Implementation and Integration Section 19.4. Assurance During Operation and Maintenance Section 19.5. Summary Section 19.6. Research Issues Section 19.7. Further Reading Section 19.8. Exercises Chapter 20. Formal Methods Section 20.1. Formal Verification Techniques Section 20.2. Formal Specification Section 20.3. Early Formal Verification Techniques Section 20.4. Current Verification Systems Section 20.5. Summary Section 20.6. Research Issues Section 20.7. Further Reading Section 20.8. Exercises Chapter 21. Evaluating Systems Section 21.1. Goals of Formal Evaluation Section 21.2. TCSEC: 1983–1999 Section 21.3. International Efforts and the ITSEC: 1991–2001 Section 21.4. Commercial International Security Requirements: 1991 Section 21.5. Other Commercial Efforts: Early 1990s Section 21.6. The Federal Criteria: 1992 Section 21.7. FIPS 140: 1994–Present Section 21.8. The Common Criteria: 1998–Present Section 21.9. SSE-CMM: 1997–Present Section 21.10. Summary Section 21.11. Research Issues Section 21.12. Further Reading Section 21.13. Exercises Part 7. Special Topics Chapter 22. Malicious Logic Section 22.1. Introduction Section 22.2. Trojan Horses Section 22.3. Computer Viruses Section 22.4. Computer Worms Section 22.5. Other Forms of Malicious Logic Section 22.6. Theory of Malicious Logic Section 22.7. Defenses Section 22.8. Summary Section 22.9. Research Issues Section 22.10. Further Reading Section 22.11. Exercises Section 22.11. Exercises Chapter 23. Vulnerability Analysis Section 23.1. Introduction Section 23.2. Penetration Studies Section 23.3. Vulnerability Classification Section 23.4. Frameworks Section 23.5. Gupta and Gligor's Theory of Penetration Analysis Section 23.6. Summary Section 23.7. Research Issues Section 23.8. Further Reading Section 23.9. Exercises Chapter 24. Auditing Section 24.1. Definitions Section 24.2. Anatomy of an Auditing System Section 24.3. Designing an Auditing System Section 24.4. A Posteriori Design Section 24.5. Auditing Mechanisms Section 24.6. Examples: Auditing File Systems Section 24.7. Audit Browsing Section 24.8. Summary Section 24.9. Research Issues Section 24.10. Further Reading Section 24.11. Exercises Chapter 25. Intrusion Detection Section 25.1. Principles Section 25.2. Basic Intrusion Detection Section 25.3. Models Section 25.4. Architecture Section 25.5. Organization of Intrusion Detection Systems Section 25.6. Intrusion Response Section 25.7. Summary Section 25.8. Research Issues Section 25.9. Further Reading Section 25.10. Exercises Part 8. Practicum Chapter 26. Network Security Section 26.1. Introduction Section 26.2. Policy Development Section 26.3. Network Organization Section 26.4. Availability and Network Flooding Section 26.5. Anticipating Attacks Section 26.6. Summary Section 26.7. Research Issues Section 26.8. Further Reading Section 26.9. Exercises Chapter 27. System Security Section 27.1. Introduction Section 27.2. Policy Section 27.3. Networks Section 27.4. Users Section 27.4. Users Section 27.5. Authentication Section 27.6. Processes Section 27.7. Files Section 27.8. Retrospective Section 27.9. Summary Section 27.10. Research Issues Section 27.11. Further Reading Section 27.12. Exercises Chapter 28. User Security Section 28.1. Policy Section 28.2. Access Section 28.3. Files and Devices Section 28.4. Processes Section 28.5. Electronic Communications Section 28.6. Summary Section 28.7. Research Issues Section 28.8. Further Reading Section 28.9. Exercises Chapter 29. Program Security Section 29.1. Introduction Section 29.2. Requirements and Policy Section 29.3. Design Section 29.4. Refinement and Implementation Section 29.5. Common Security-Related Programming Problems Section 29.6. Testing, Maintenance, and Operation Section 29.7. Distribution Section 29.8. Conclusion Section 29.9. Summary Section 29.10. Research Issues Section 29.11. Further Reading Section 29.12. Exercises Part 9. End Matter Chapter 30. Lattices Section 30.1. Basics Section 30.2. Lattices Section 30.3. Exercises Chapter 31. The Extended Euclidean Algorithm Section 31.1. The Euclidean Algorithm Section 31.2. The Extended Euclidean Algorithm Section 31.3. Solving ax mod n = 1 Section 31.4. Solving ax mod n = b Section 31.5. Exercises Chapter 32. Entropy and Uncertainty Section 32.1. Conditional and Joint Probability Section 32.2. Entropy and Uncertainty Section 32.3. Joint and Conditional Entropy Section 32.4. Exercises Chapter 33. Virtual Machines Chapter 33. Virtual Machines Section 33.1. Virtual Machine Structure Section 33.2. Virtual Machine Monitor Section 33.3. Exercises Chapter 34. Symbolic Logic Section 34.1. Propositional Logic Section 34.2. Predicate Logic Section 34.3. Temporal Logic Systems Section 34.4. Exercises Chapter 35. Example Academic Security Policy Section 35.1. University of California E-mail Policy Section 35.2. The Acceptable Use Policy for the University of California, Davis Bibliography
好例子网口号:伸出你的我的手 — 分享!
相关软件
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论