Table of Contents
- An Overview of Computer Security
- Access Control Matrix
- Foundational Results
- Security Policies
- Confidentiality Policies
- Integrity Policies
- Hybrid Policies
- Basic Cryptography
- Key Management
- Cipher Techniques
- Authentication
- Design Principles
- Representing Identity
- Access Control Mechanisms
- Information Flow
- Confinement Problem
- Introduction to Assurance (contributed by Elisabeth Sullivan)
- Evaluating Systems (contributed by Elisabeth Sullivan)
- Malicious Logic
- Vulnerability Analysis
- Auditing
- Intrusion Detection
- Network Security
- System Security
- User Security
- Program Security
- Lattices
- The Extended Euclidean Algorithm
- Virtual Machines
- Bibliography