Image from Google Jackets

Security engineering : a guide to building dependable distributed systems / Ross J. Anderson.

By: Material type: TextTextPublication details: Indianapolis, IN : Wiley Pub., c2020.Edition: 3rd edDescription: xlix, 1040 p. : ill. ; 24 cmISBN:
  • 9781119642787
  • 9781119642831
Subject(s): DDC classification:
  • 005.1 22
LOC classification:
  • QA76.9.A25 A54 2020
Online resources:
Contents:
What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.1 Available 18428795
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.2 Available 18428796
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.3 Available 18428797
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.4 Available 18428798
Books Books Informatics and Virtual Education Library Collection General Collection Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.5 Available 18428799
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.6 Not For Loan 18428800
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.7 Not For Loan 18428801
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.8 Not For Loan 18428802
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.9 Not For Loan 18428803
Books Books Informatics and Virtual Education Library Collection Special Reserve Non-fiction QA76.9.A25 A54 2020 (Browse shelf(Opens below)) C.10 Not For Loan 18428804
Browsing Informatics and Virtual Education Library Collection shelves, Shelving location: General Collection, Collection: Non-fiction Close shelf browser (Hides shelf browser)
QA76.9.A25 A54 2020 Security engineering : QA76.9.A25 A54 2020 Security engineering : QA76.9.A25 A54 2020 Security engineering : QA76.9.A25 A54 2020 Security engineering : QA 76.9 .A25J64 2022 Security policies and implementation issues / QA 76.9 .A25J64 2022 Security policies and implementation issues / QA 76.9 .A25J64 2022 Security policies and implementation issues /

Includes bibliographical references (p. 893-996) and index.

What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.

There are no comments on this title.

to post a comment.
© The University of Dodoma 2020