Security Engineering / Ross J. Anderson
Dil: İngilizce Indianapolis: John Wiley, 2008Baskı: Second EditionTanım: xl, 1040 pages; 24.1 cmİçerik türü:- text
- unmediated
- volume
- 9780470068526
- A Guide to Building Dependable Distributed Systems
- 005.1 A53 2008
İçindekiler:
What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.
Materyal türü | Geçerli Kütüphane | Koleksiyon | Yer Numarası | Kopya numarası | Durum | Notlar | İade tarihi | Barkod | Materyal Ayırtmaları | |
---|---|---|---|---|---|---|---|---|---|---|
Books | CIU LIBRARY Genel Koleksiyon | Genel Kolaksiyon | 005.1 A53 2008 (Rafa gözat(Aşağıda açılır)) | C.1 | Kullanılabilir | Deniz Plaza | 0060353 |
Toplam ayırtılanlar: 0
CIU LIBRARY raflarına göz atılıyor, Raftaki konumu: Genel Koleksiyon, Koleksiyon: Genel Kolaksiyon Raf tarayıcısını kapatın(Raf tarayıcısını kapatır)
004.6 P28 2014 Computer Organization and Design / | 004.6 P28 2014 Computer Organization and Design / | 004.62 F45 1997 TCP/IP / | 005.1 A53 2008 Security Engineering / | 005.1 B44 1996 Software engineering fundamentals | 005.1 B47 2008 Application Architecture for WebSphere / | 005.1 B47 2011 iOS PROGRAMLAMAYA GİRİŞ / |
Includes index
Includes bibliography (pages 893-996)
What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.