Security engineering : a guide to building dependable distributed systems
Material type: TextPublication details: New Delhi : Wiley, c2008.Edition: 2nd edDescription: xl, 1040 p. : ill. ; 25 cmISBN:- 9788126516674
- 005.8 22 AND-S
- QA76.9.A25 A54 2008
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | Course reserves |
---|---|---|---|---|---|---|---|---|
Books | IIITD General Stacks | Computer Science and Engineering | 005.8 AND-S (Browse shelf(Opens below)) | Available | 003602 | |||
Books | IIITD General Stacks | Computer Science and Engineering | 005.8 AND-S (Browse shelf(Opens below)) | Available | 003603 | |||
Books | IIITD General Stacks | Computer Science and Engineering | 005.8 AND-S (Browse shelf(Opens below)) | Available | 003604 | |||
Books | IIITD General Stacks | Computer Science and Engineering | 005.8 AND-S (Browse shelf(Opens below)) | Available | 002613 | |||
Reference | IIITD Reference | Computer Science and Engineering | REF 005.8 AND-S (Browse shelf(Opens below)) | Not for loan | 000233 |
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.746 SAY-I Introduction to data compression | REF 005.75 DOU-P PostgreSQL : | REF 005.758 CRO-S Search engines : | REF 005.8 AND-S Security engineering : | REF 005.8 ASH-Q Quantitative-qualitative friction ridge analysis : | REF 005.8 BAS-D Database security | REF 005.8 BHU-A Artificial intelligence and network security: |
Includes bibliographical references (p. 893-996) and index.
What is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.
There are no comments on this title.