Logo

The Protection of Information in Computer Systems

Small book cover: The Protection of Information in Computer Systems

The Protection of Information in Computer Systems
by

Publisher: MIT

Description:
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures -- whether hardware or software -- that are necessary to support information protection.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Good Digital Hygiene: A guide to staying secure in cyberspaceGood Digital Hygiene: A guide to staying secure in cyberspace
by - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(11656 views)
Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(20911 views)
Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(14679 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(20933 views)