Cargando…

Security engineering : a guide to building dependable distributed systems /

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully upda...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Anderson, Ross, 1956-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley Publishing Inc., 2008.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn676699410
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 101101s2008 inua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d EBLCP  |d OCLCQ  |d MHW  |d UMI  |d OCLCQ  |d STF  |d B24X7  |d OCLCQ  |d DEBSZ  |d OCLCF  |d OCLCQ  |d YDXCP  |d QCL  |d AUD  |d OCLCQ  |d S3O  |d OCLCQ  |d TEFOD  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCO  |d Z5A  |d NRC  |d MERUC  |d OCLCQ  |d OCLCA  |d KIJ  |d OCLCO  |d LND  |d CEF  |d OCLCA  |d COO  |d OCLCQ  |d WYU  |d UAB  |d AU@  |d VT2  |d GRG  |d OCLCO  |d OCLCQ  |d LUN  |d BRF  |d EYM  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 639194438  |a 706032588  |a 741566633  |a 765142970  |a 983525021  |a 1038405478  |a 1043061098  |a 1060198086  |a 1062990141  |a 1103278632  |a 1109007064  |a 1129363191  |a 1153011703  |a 1167570263  |a 1179813019  |a 1180584747  |a 1192336060  |a 1194854702  |a 1240511593 
020 |a 9781118008386  |q (electronic bk.) 
020 |a 1118008383  |q (electronic bk.) 
020 |a 9781118008362  |q (electronic bk.) 
020 |a 1118008367  |q (electronic bk.) 
020 |z 9780470068526 
020 |z 0470068523 
029 1 |a AU@  |b 000054952178 
029 1 |a DEBSZ  |b 368467120 
029 1 |a DEBSZ  |b 396930433 
029 1 |a DEBSZ  |b 45249186X 
029 1 |a GBVCP  |b 785356770 
029 1 |a NZ1  |b 13925152 
035 |a (OCoLC)676699410  |z (OCoLC)639194438  |z (OCoLC)706032588  |z (OCoLC)741566633  |z (OCoLC)765142970  |z (OCoLC)983525021  |z (OCoLC)1038405478  |z (OCoLC)1043061098  |z (OCoLC)1060198086  |z (OCoLC)1062990141  |z (OCoLC)1103278632  |z (OCoLC)1109007064  |z (OCoLC)1129363191  |z (OCoLC)1153011703  |z (OCoLC)1167570263  |z (OCoLC)1179813019  |z (OCoLC)1180584747  |z (OCoLC)1192336060  |z (OCoLC)1194854702  |z (OCoLC)1240511593 
037 |a CL0500000099  |b Safari Books Online 
037 |a F87B8B44-19B4-48A9-81B5-3F52A8E7C4D1  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b A54 2008eb 
072 7 |a COM  |x 051390  |2 bisacsh 
072 7 |a COM  |x 051440  |2 bisacsh 
072 7 |a COM  |x 051230  |2 bisacsh 
082 0 4 |a 005.1  |2 22 
049 |a UAMI 
100 1 |a Anderson, Ross,  |d 1956- 
245 1 0 |a Security engineering :  |b a guide to building dependable distributed systems /  |c Ross J. Anderson. 
250 |a Second edition. 
264 1 |a Indianapolis, IN :  |b Wiley Publishing Inc.,  |c 2008. 
264 4 |c ©2008 
300 |a 1 online resource (xl, 1040 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references (pages 893-996) and index. 
505 0 |a What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance. 
520 |a The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Electronic data processing  |x Distributed processing. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Traitement réparti. 
650 7 |a COMPUTERS  |x Programming  |x Open Source.  |2 bisacsh 
650 7 |a COMPUTERS  |x Software Development & Engineering  |x Tools.  |2 bisacsh 
650 7 |a COMPUTERS  |x Software Development & Engineering  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Electronic data processing  |x Distributed processing  |2 fast 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Verteiltes System  |2 gnd 
650 7 |a IT-säkerhet.  |2 sao 
776 0 8 |i Print version:  |a Anderson, Ross, 1956-  |t Security engineering.  |b 2nd ed.  |d Indianapolis, IN : Wiley Pub., ©2008  |z 9780470068526  |w (DLC) 2008006392  |w (OCoLC)192045774 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780470068526/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH16072511 
938 |a Askews and Holts Library Services  |b ASKH  |n AH16072513 
938 |a Books 24x7  |b B247  |n bks00025211 
938 |a EBSCOhost  |b EBSC  |n 343359 
938 |a YBP Library Services  |b YANK  |n 3532762 
994 |a 92  |b IZTAP