You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The final quarter of the 20th century has seen the establishment of a global computational infrastructure. This and the advent of programming languages such as Java, supporting mobile distributed computing, has posed a significant challenge to computer sciences. The infrastructure can support commerce, medicine and government, but only if communications and computing can be secured against catastrophic failure and malicious interference.
A computer security expert shows readers how to build more secure software by building security in and putting it into practice. The CD-ROM contains a tutorial and demo of the Fortify Source Code Analysis Suite.
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...
Focuses on policy issues in three areas: national cryptography policy, including federal information processing standards and export controls; guidance on safeguarding unclassified information in federal agencies; and legal issues and information security, including electronic commerce, privacy, and intellectual property. Includes: computer security act and related documents and evaluation of the digital signature standard. Charts and tables.
Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".
This book constitutes the refereed proceedings of the Second International Conference on Foundations of Software Science and Computation Structures, FOSSACS '99, held in Amsterdam, The Netherlands in March 1999 as part of ETAPS'99. The 18 revised full papers presented were carefully selected from a total of 40 submissions. Also included are three invited papers. The central issues of the papers are theories and methods which suport the specification, transformation, verification and analysis of programs and software systems.