Security engineering : a guide to building dependable distributed systems /
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully upda...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN :
Wiley Publishing Inc.,
2008.
|
Edition: | Second edition. |
Subjects: | |
Online Access: | CONNECT |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | in00006043342 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 101101s2008 inua ob 001 0 eng d | ||
005 | 20220718131046.6 | ||
035 | |a 1WRLDSHRocn676699410 | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d EBLCP |d OCLCQ |d MHW |d UMI |d OCLCQ |d STF |d B24X7 |d OCLCQ |d DEBSZ |d OCLCF |d OCLCQ |d YDXCP |d QCL |d AUD |d OCLCQ |d S3O |d OCLCQ |d TEFOD |d OCLCO |d OCLCQ |d YDX |d OCLCO |d Z5A |d NRC |d MERUC |d OCLCQ |d OCLCA |d KIJ |d OCLCO |d LND |d CEF |d OCLCA |d COO |d OCLCQ |d WYU |d UAB |d AU@ |d VT2 |d GRG |d OCLCO |d OCLCQ |d LUN |d BRF |d EYM |d OCLCQ |d UKAHL |d OCLCQ |d OCLCO | ||
019 | |a 639194438 |a 706032588 |a 741566633 |a 765142970 |a 983525021 |a 1038405478 |a 1043061098 |a 1060198086 |a 1062990141 |a 1103278632 |a 1109007064 |a 1129363191 |a 1153011703 |a 1167570263 |a 1179813019 |a 1180584747 |a 1192336060 |a 1194854702 |a 1240511593 | ||
020 | |a 9781118008386 |q (electronic bk.) | ||
020 | |a 1118008383 |q (electronic bk.) | ||
020 | |a 9781118008362 |q (electronic bk.) | ||
020 | |a 1118008367 |q (electronic bk.) | ||
020 | |z 9780470068526 | ||
020 | |z 0470068523 | ||
035 | |a (OCoLC)676699410 |z (OCoLC)639194438 |z (OCoLC)706032588 |z (OCoLC)741566633 |z (OCoLC)765142970 |z (OCoLC)983525021 |z (OCoLC)1038405478 |z (OCoLC)1043061098 |z (OCoLC)1060198086 |z (OCoLC)1062990141 |z (OCoLC)1103278632 |z (OCoLC)1109007064 |z (OCoLC)1129363191 |z (OCoLC)1153011703 |z (OCoLC)1167570263 |z (OCoLC)1179813019 |z (OCoLC)1180584747 |z (OCoLC)1192336060 |z (OCoLC)1194854702 |z (OCoLC)1240511593 | ||
037 | |a CL0500000099 |b Safari Books Online | ||
037 | |a F87B8B44-19B4-48A9-81B5-3F52A8E7C4D1 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b A54 2008eb | |
082 | 0 | 4 | |a 005.1 |2 22 |
049 | |a TXMM | ||
100 | 1 | |a Anderson, Ross, |d 1956- | |
245 | 1 | 0 | |a Security engineering : |b a guide to building dependable distributed systems / |c Ross J. Anderson. |
250 | |a Second edition. | ||
264 | 1 | |a Indianapolis, IN : |b Wiley Publishing Inc., |c 2008. | |
264 | 4 | |c ©2008 | |
300 | |a 1 online resource (xl, 1040 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 893-996) and index. | ||
505 | 0 | |a What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance. | |
520 | |a The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. | ||
588 | 0 | |a Print version record. | |
590 | |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Electronic data processing |x Distributed processing. | |
730 | 0 | |a WORLDSHARE SUB RECORDS | |
776 | 0 | 8 | |i Print version: |a Anderson, Ross, 1956- |t Security engineering. |b 2nd ed. |d Indianapolis, IN : Wiley Pub., ©2008 |z 9780470068526 |w (DLC) 2008006392 |w (OCoLC)192045774 |
856 | 4 | 0 | |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780470068526/?ar |z CONNECT |3 O'Reilly |t 0 |
949 | |a ho0 | ||
994 | |a 92 |b TXM | ||
998 | |a wi |d z | ||
999 | f | f | |s a2896d6d-0e6d-4f5b-8865-b570756a16f4 |i a478b2d4-badf-4dee-83ae-c7a1e798cbc2 |t 0 |
952 | f | f | |a Middle Tennessee State University |b Main |c James E. Walker Library |d Electronic Resources |t 0 |e QA76.9.A25 A54 2008eb |h Library of Congress classification |
856 | 4 | 0 | |3 O'Reilly |t 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9780470068526/?ar |z CONNECT |