This text moves away from the 'multi-level' security approach to compare and evaluate design alternatives in computer security. It provides technology-proof insights, and covers the technical issues of computer security in the network environment
Bibliography
Includes bibliographical references (pages [307]-313) and index