Home > Store

Fundamentals of Computer Security Technology

Register your product to gain access to bonus material or receive a coupon.

Fundamentals of Computer Security Technology


  • Sorry, this book is no longer in print.
Not for Sale



  • uses a tutorial style.
  • covers the state-of-the-art research in computer security.
  • discusses the interrelationships among all topics.
  • addresses threat organization, derivation, and basic strategy.
  • details the basic security modeling concepts, presents various components of security models, and describes the most familiar security models.
  • provides an overview of safeguard and countermeasure approaches for computer security.
  • covers network security and database security.
  • considers security evaluation.


  • Copyright 1994
  • Dimensions: 7" x 9-1/4"
  • Pages: 432
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-108929-3
  • ISBN-13: 978-0-13-108929-7

Tutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. KEY TOPICS: First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. MARKET: For engineers and scientists interested in computer security.

Sample Content

Table of Contents

 1. Threats to Computer Systems.

 2. Threat Trees.

 3. Categorization of Attacks.

 4. Trojan Horses and Viruses.

 5. Common Attack Methods.

 6. Security Labels.

 7. The Lattice of Security Labels.

 8. Security Policies.

 9. The Bell-Lapadula Disclosure Model.

10. BLM Analysis and Debate.

11. Non-Deductibility and Non-Interference Security.

12. The Biba Integrity Model.

13. The Clark-Wilson Integrity Model.

14. Denial of Service.

15. Safeguards and Countermeasures.

16. Auditing.

17. Intrusion Detection.

18. Identification and Authentication.

19. Passwords.

20. Encryption.

21. Key Management Protocols.

22. Access Control.

23. Covert Channels.

24. Composing Security.

25. Privileges and Roles.

26. Security Kernels.

27. Network Security.

28. Database Security.

29. Security Evaluation.

Annotated Bibliography.

25 Greatest Works in Computer Security.



Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership