Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Chapter 19

Introduction to Assurance

BOTTOM: Not a whit: I have a device to make all well. Write me a prologue; and let the prologue seem to say, we will do no harm with our swords, and that Pyramus is not killed indeed; and, for the more better assurance, tell them that I, Pyramus, am not Pyramus, but Bottom the weaver: this will put them out of fear.

A Midsummer Night’s Dream, III, i, 17–23.

This chapter introduces the concepts of security assurance and trusted systems. Assurance for secure and trusted systems must be an integral part of the development process. The following chapters elaborate on the concepts and ideas introduced here.

19.1 Assurance and Trust

In previous chapters we have used the terms trusted system and secure system ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145