ComputerSecurity2e TOC
ComputerSecurity2e TOC
i i
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlv
About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlix
PART I : INTRODUCTION 1
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
vii
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page viii — #8
i i
viii Contents
PART II : FOUNDATIONS 29
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page ix — #9
i i
Contents ix
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page x — #10
i i
x Contents
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xi — #11
i i
Contents xi
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xii — #12
i i
xii Contents
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xiii — #13
i i
Contents xiii
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xiv — #14
i i
xiv Contents
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xv — #15
i i
Contents xv
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xvi — #16
i i
xvi Contents
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xvii — #17
i i
Contents xvii
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xviii — #18
i i
xviii Contents
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xix — #19
i i
Contents xix
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xx — #20
i i
xx Contents
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxi — #21
i i
Contents xxi
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxii — #22
i i
xxii Contents
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxiii — #23
i i
Contents xxiii
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxiv — #24
i i
xxiv Contents
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxv — #25
i i
Contents xxv
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxvi — #26
i i
xxvi Contents
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i
i i
“Bishop_FM” — 2018/10/15 — 10:43 — page xxvii — #27
i i
Contents xxvii
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1251
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1341
Excerpt from Computer Security, 2/E, by Matthew Bishop (ISBN: 9780321712332). Copyright © 2019 Pearson Education, Inc.
Reproduction of any sort without permission from the publisher is strictly prohibited.
i i
i i