000 | 05000cam a2200697 i 4500 | ||
---|---|---|---|
001 | on1226521073 | ||
003 | OCoLC | ||
005 | 20240523125543.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 201211t20202020inua ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCO _dOCLCQ _dOCLCO _dOCLCQ _dOCLCL _dQGE _dYDX _dYDXIT _dN$T _dOCLCF _dUKAHL _dEBLCP _dSOE _dYT1 _dIEEEE _dA7U |
||
019 |
_a1224514329 _a1224516855 _a1225361509 _a1225548789 _a1229059248 |
||
020 |
_a9781119644682 _q(electronic bk.) |
||
020 |
_a1119644682 _q(electronic bk.) |
||
020 |
_z9781119642787 _q(print) |
||
020 |
_a9781119642817 _q(electronic book) |
||
020 |
_a1119642817 _q(electronic book) |
||
020 |
_a9781119642831 _q(electronic book) |
||
020 |
_a1119642833 _q(electronic book) |
||
020 | _z1119642787 | ||
024 | 7 |
_a10.1002/9781119644682 _2doi |
|
029 | 1 |
_aAU@ _b000075200299 |
|
029 | 1 |
_aAU@ _b000071980734 |
|
029 | 1 |
_aAU@ _b000076576332 |
|
035 |
_a(OCoLC)1226521073 _z(OCoLC)1224514329 _z(OCoLC)1224516855 _z(OCoLC)1225361509 _z(OCoLC)1225548789 _z(OCoLC)1229059248 |
||
037 |
_a9820859 _bIEEE |
||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.1 _222 |
049 | _aMAIN | ||
100 | 1 |
_aAnderson, Ross. _0http://viaf.org/viaf/sourceID/LC%7cnb2004300232 |
|
245 | 1 | 0 |
_aSecurity engineering : _ba guide to building dependable distributed systems / _cRoss Anderson. |
250 | _aThird edition | ||
264 | 1 |
_aIndianapolis : _bJohn Wiley & Sons Inc, _c[2020] |
|
264 | 4 | _c�2020 | |
300 |
_a1 online resource (1232 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aWhat is security engineering? -- Who is the opponent? -- Psychology and usability -- Protocols -- Cryptography -- Access control -- Distributed systems -- Economics -- Multilevel security -- Boundaries -- Inference control -- Banking and bookkeeping -- Locks and alarms -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Tamper resistance -- Side channels -- Advanced cyptographic engineering -- Network attack and defence -- Phones -- Electronic and information warfare -- Copyright and DRM -- New directions? -- Surveillance or Privacy? -- Secure systems development -- Assurance and sustainability -- Beyond "computer says no" | |
520 | _aIn Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020. The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop? | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aElectronic data processing _xDistributed processing. |
|
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 | _aTraitement r�eparti. | |
650 | 2 | _aComputer Security | |
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aElectronic data processing _xDistributed processing _2fast |
|
758 |
_ihas work: _aSecurity engineering (Text) _1https://id.oclc.org/worldcat/entity/E39PCFGWRhPBkGDH6MG3FV9cvb _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aAnderson, Ross, 1956- _tSecurity engineering. _bThird edition. _dIndianapolis, Indiana : John Wiley & Sons, Inc., [2020] _z1119642787 _z9781119642787 _w(OCoLC)1136871852 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119644682 |
938 |
_aAskews and Holts Library Services _bASKH _nAH37737111 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL6412239 |
||
938 |
_aEBSCOhost _bEBSC _n2692199 |
||
938 |
_aYBP Library Services _bYANK _n17134552 |
||
938 |
_aYBP Library Services _bYANK _n301774334 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12761 _d12761 |