O'Reilly logo

Computer Security: Art and Science by Matt Bishop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part 7. Special Topics

Part 7 explores four topics that play important roles in computer security. They underlie the security of modern systems and networks.

Chapter 22, “Malicious Logic,” discusses programs set up by attackers to perform actions that violate the site's security policy. The programs act with the privileges of an authorized user but execute without that user's knowledge.

Chapter 23, “Vulnerability Analysis,” describes penetration testing. Although important as a standard a posteriori testing technique, penetration testing models the way attackers analyze a system when determining how best to attack it. The insight gained from this mode of thinking is invaluable to defenders. Chapter 23 also discusses models of vulnerabilities to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required