Security engineering : a guide to building dependable distributed systems /

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully upda...

Full description

Saved in:
Bibliographic Details
Main Author: Anderson, Ross, 1956-
Format: Electronic eBook
Language:English
Published: Indianapolis, IN : Wiley Publishing Inc., 2008.
Edition:Second edition.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000 i 4500
001 in00006043342
006 m o d
007 cr cnu---unuuu
008 101101s2008 inua ob 001 0 eng d
005 20220718131046.6
035 |a 1WRLDSHRocn676699410 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d OCLCQ  |d MHW  |d UMI  |d OCLCQ  |d STF  |d B24X7  |d OCLCQ  |d DEBSZ  |d OCLCF  |d OCLCQ  |d YDXCP  |d QCL  |d AUD  |d OCLCQ  |d S3O  |d OCLCQ  |d TEFOD  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCO  |d Z5A  |d NRC  |d MERUC  |d OCLCQ  |d OCLCA  |d KIJ  |d OCLCO  |d LND  |d CEF  |d OCLCA  |d COO  |d OCLCQ  |d WYU  |d UAB  |d AU@  |d VT2  |d GRG  |d OCLCO  |d OCLCQ  |d LUN  |d BRF  |d EYM  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO 
019 |a 639194438  |a 706032588  |a 741566633  |a 765142970  |a 983525021  |a 1038405478  |a 1043061098  |a 1060198086  |a 1062990141  |a 1103278632  |a 1109007064  |a 1129363191  |a 1153011703  |a 1167570263  |a 1179813019  |a 1180584747  |a 1192336060  |a 1194854702  |a 1240511593 
020 |a 9781118008386  |q (electronic bk.) 
020 |a 1118008383  |q (electronic bk.) 
020 |a 9781118008362  |q (electronic bk.) 
020 |a 1118008367  |q (electronic bk.) 
020 |z 9780470068526 
020 |z 0470068523 
035 |a (OCoLC)676699410  |z (OCoLC)639194438  |z (OCoLC)706032588  |z (OCoLC)741566633  |z (OCoLC)765142970  |z (OCoLC)983525021  |z (OCoLC)1038405478  |z (OCoLC)1043061098  |z (OCoLC)1060198086  |z (OCoLC)1062990141  |z (OCoLC)1103278632  |z (OCoLC)1109007064  |z (OCoLC)1129363191  |z (OCoLC)1153011703  |z (OCoLC)1167570263  |z (OCoLC)1179813019  |z (OCoLC)1180584747  |z (OCoLC)1192336060  |z (OCoLC)1194854702  |z (OCoLC)1240511593 
037 |a CL0500000099  |b Safari Books Online 
037 |a F87B8B44-19B4-48A9-81B5-3F52A8E7C4D1  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b A54 2008eb 
082 0 4 |a 005.1  |2 22 
049 |a TXMM 
100 1 |a Anderson, Ross,  |d 1956- 
245 1 0 |a Security engineering :  |b a guide to building dependable distributed systems /  |c Ross J. Anderson. 
250 |a Second edition. 
264 1 |a Indianapolis, IN :  |b Wiley Publishing Inc.,  |c 2008. 
264 4 |c ©2008 
300 |a 1 online resource (xl, 1040 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 893-996) and index. 
505 0 |a What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance. 
520 |a The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. 
588 0 |a Print version record. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Computer security. 
650 0 |a Electronic data processing  |x Distributed processing. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Anderson, Ross, 1956-  |t Security engineering.  |b 2nd ed.  |d Indianapolis, IN : Wiley Pub., ©2008  |z 9780470068526  |w (DLC) 2008006392  |w (OCoLC)192045774 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780470068526/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s a2896d6d-0e6d-4f5b-8865-b570756a16f4  |i a478b2d4-badf-4dee-83ae-c7a1e798cbc2  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.A25 A54 2008eb  |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780470068526/?ar  |z CONNECT