Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition
Table of Contents
Foreword by Bruce Schneier.
Chapter 1 What Is Security Engineering?
Chapter 2 Usability and Psychology.
Chapter 3 Protocols.
Chapter 4 Access Control.
Chapter 5 Cryptography.
Chapter 6 Distributed Systems.
Chapter 7 Economics.
Chapter 8 Multilevel Security.
Chapter 9 Multilateral Security.
Chapter 10 Banking and Bookkeeping.
Chapter 11 Physical Protection.
Chapter 12 Monitoring and Metering.
Chapter 13 Nuclear Command and Control.
Chapter 14 Security Printing and Seals.
Chapter 15 Biometrics.
Chapter 16 Physical Tamper Resistance.
Chapter 17 Emission Security.
Chapter 18 API Attacks.
Chapter 19 Electronic and Information Warfare.
Chapter 20 Telecom System Security.
Chapter 21 Network Attack and Defense.
Chapter 22 Copyright and DRM.
Chapter 23 The Bleeding Edge.
Chapter 24 Terror, Justice and Freedom.
Chapter 25 Managing the Development of Secure Systems.
Chapter 26 System Evaluation and Assurance.
Chapter 27 Conclusions.
Sign up now »
- FTLead Software EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTechnical Business AnalystNSW
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTR&D EngineerSA
- FTOS Web Applications DeveloperNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia