Provides an overview of the vulnerabilities & threats to info. security & introduces important concepts & terms. Summarizes the definitions & controls of the trusted computer system evaluation criteria & discusses info. security policy focusing on info. control & dissemination. Also discusses such topics as the the architectures used in the development of trusted relational database mgmt. systems, the effects that multilevel DBMS security requirements can have on the system s data integrity, a new approach to formal modeling of a trusted computer system, & a new security model for mandatory access controls in object-oriented database systems.
"synopsis" may belong to another edition of this title.
(No Available Copies)
If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!Create a Want