Security Basics for Computer Architects (Record no. 84888)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03039nam a22004935i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-01742-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730163709.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 220601s2013 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031017421 |
-- | 978-3-031-01742-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3815 |
100 1# - AUTHOR NAME | |
Author | Lee, Ruby B. |
245 10 - TITLE STATEMENT | |
Title | Security Basics for Computer Architects |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVI, 96 p. |
490 1# - SERIES STATEMENT | |
Series statement | Synthesis Lectures on Computer Architecture, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Preface -- Threat-Based Design -- Security Policy Models -- Access Control -- Cryptography for Confidentiality and Integrity -- Public-Key Crytography -- Security Protocols -- Summary -- Bibliography -- Appendix: Further Readings -- Author's Biography. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-awarecomputer architectures. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-01742-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2013. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Microprocessors. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer architecture. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Processor Architectures. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1935-3243 |
912 ## - | |
-- | ZDB-2-SXSC |
No items available.