Part 8. Practicum

The practice of computer security draws on the principles and mechanisms discussed in Parts 1 through 7. Part 8 explores the application of these ideas and tools in four different settings. Each chapter considers a particular situation and discusses solutions that include various levels of security. Beginning with policy considerations, each chapter develops a security architecture and deploys appropriate mechanisms to provide the desired level of security.

Chapter 26, “Network Security,” considers a corporation that must provide public access to some information but limit access to other information even within the company. It derives parts of a network configuration and security mechanisms that support the policy.

Chapter 27 ...

Get Computer Security: Art and Science now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.