Security engineering: a guide to building dependable distributed systems
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2008
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XL, 1040 S. Ill. |
ISBN: | 9780470068526 0470068523 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV023291403 | ||
003 | DE-604 | ||
005 | 20170428 | ||
007 | t | ||
008 | 080506s2008 a||| |||| 00||| eng d | ||
015 | |a GBA800232 |2 dnb | ||
020 | |a 9780470068526 |9 978-0-470-06852-6 | ||
020 | |a 0470068523 |c (hbk.) : £45.00 |9 0-470-06852-3 | ||
035 | |a (OCoLC)192045774 | ||
035 | |a (DE-599)HBZHT015450287 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-29T |a DE-739 |a DE-861 |a DE-634 |a DE-Aug4 |a DE-706 |a DE-573 |a DE-11 |a DE-522 |a DE-898 |a DE-355 |a DE-473 |a DE-703 |a DE-83 |a DE-91G | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.1 |2 22 | |
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
100 | 1 | |a Anderson, Ross |d 1956-2024 |e Verfasser |0 (DE-588)135652715 |4 aut | |
245 | 1 | 0 | |a Security engineering |b a guide to building dependable distributed systems |c Ross J. Anderson |
250 | |a 2. ed. | ||
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2008 | |
300 | |a XL, 1040 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Seguridad Informática | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electronic data processing |x Distributed processing | |
650 | 0 | 7 | |a Dezentrale Datenverarbeitung |0 (DE-588)7545389-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Dezentrale Datenverarbeitung |0 (DE-588)7545389-7 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016476012&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016476012 |
Datensatz im Suchindex
_version_ | 1806232437339979776 |
---|---|
adam_text |
Contents
at a Glance
Preface to the Second Edition
Foreword by Bruce Schneier
Preface
Acknowledgments
Parti
Chapter
1
What Is Security Engineering?
Chapter
2
Usability and Psychology
Chapter
3
Protocols
Chapter
4
Access Control
Chapter
5
Cryptography
Chapter
6
Distributed Systems
Chapter
7
Economics
Partii
Chapter
8
Multilevel Security
Chapter
9
Multilateral Security
xxv
xxvii
xxix
xxxv
3
17
63
93
Τ
29
185
215
239
275
Chapter
10
Banking and Bookkeeping
313
Chapter
11
Physical Protection
365
Chapter
12
Monitoring and Metering
389
Chapter
13
Nuclear Command and Control
415
viii Contents
at a Glance
Chapter
14
Security Printing and Seals
433
Chapter
15
Biometrics
457
Chapter
16
Physical Tamper Resistance
483
Chapter
17
Emission Security
523
Chapter
18
API Attacks
547
Chapter
19
Electronic and Information Warfare
559
Chapter
20
Telecom System Security
595
Chapter
21
Network Attack and Defense
633
Chapter
22
Copyright and DRM
679
Chapter
23
The Bleeding Edge
727
Part III
Chapter
24
Terror, Justice and Freedom
769
Chapter
25
Managing the Development of Secure Systems
815
Chapter
26
System Evaluation and Assurance
857
Chapter
27
Conclusions
889
Bibliography
893
Index
997 |
adam_txt |
Contents
at a Glance
Preface to the Second Edition
Foreword by Bruce Schneier
Preface
Acknowledgments
Parti
Chapter
1
What Is Security Engineering?
Chapter
2
Usability and Psychology
Chapter
3
Protocols
Chapter
4
Access Control
Chapter
5
Cryptography
Chapter
6
Distributed Systems
Chapter
7
Economics
Partii
Chapter
8
Multilevel Security
Chapter
9
Multilateral Security
xxv
xxvii
xxix
xxxv
3
17
63
93
Τ
29
185
215
239
275
Chapter
10
Banking and Bookkeeping
313
Chapter
11
Physical Protection
365
Chapter
12
Monitoring and Metering
389
Chapter
13
Nuclear Command and Control
415
viii Contents
at a Glance
Chapter
14
Security Printing and Seals
433
Chapter
15
Biometrics
457
Chapter
16
Physical Tamper Resistance
483
Chapter
17
Emission Security
523
Chapter
18
API Attacks
547
Chapter
19
Electronic and Information Warfare
559
Chapter
20
Telecom System Security
595
Chapter
21
Network Attack and Defense
633
Chapter
22
Copyright and DRM
679
Chapter
23
The Bleeding Edge
727
Part III
Chapter
24
Terror, Justice and Freedom
769
Chapter
25
Managing the Development of Secure Systems
815
Chapter
26
System Evaluation and Assurance
857
Chapter
27
Conclusions
889
Bibliography
893
Index
997 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Anderson, Ross 1956-2024 |
author_GND | (DE-588)135652715 |
author_facet | Anderson, Ross 1956-2024 |
author_role | aut |
author_sort | Anderson, Ross 1956-2024 |
author_variant | r a ra |
building | Verbundindex |
bvnumber | BV023291403 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 273 ST 276 ST 277 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)192045774 (DE-599)HBZHT015450287 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV023291403</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170428</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080506s2008 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA800232</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470068526</subfield><subfield code="9">978-0-470-06852-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470068523</subfield><subfield code="c">(hbk.) : £45.00</subfield><subfield code="9">0-470-06852-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)192045774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT015450287</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anderson, Ross</subfield><subfield code="d">1956-2024</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)135652715</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security engineering</subfield><subfield code="b">a guide to building dependable distributed systems</subfield><subfield code="c">Ross J. Anderson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XL, 1040 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Seguridad Informática</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing</subfield><subfield code="x">Distributed processing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Dezentrale Datenverarbeitung</subfield><subfield code="0">(DE-588)7545389-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Dezentrale Datenverarbeitung</subfield><subfield code="0">(DE-588)7545389-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016476012&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016476012</subfield></datafield></record></collection> |
id | DE-604.BV023291403 |
illustrated | Illustrated |
index_date | 2024-07-02T20:43:21Z |
indexdate | 2024-08-02T00:11:24Z |
institution | BVB |
isbn | 9780470068526 0470068523 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016476012 |
oclc_num | 192045774 |
open_access_boolean | |
owner | DE-384 DE-29T DE-739 DE-861 DE-634 DE-Aug4 DE-706 DE-573 DE-11 DE-522 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-703 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-384 DE-29T DE-739 DE-861 DE-634 DE-Aug4 DE-706 DE-573 DE-11 DE-522 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-473 DE-BY-UBG DE-703 DE-83 DE-91G DE-BY-TUM |
physical | XL, 1040 S. Ill. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Wiley |
record_format | marc |
spelling | Anderson, Ross 1956-2024 Verfasser (DE-588)135652715 aut Security engineering a guide to building dependable distributed systems Ross J. Anderson 2. ed. Indianapolis, Ind. Wiley 2008 XL, 1040 S. Ill. txt rdacontent n rdamedia nc rdacarrier Seguridad Informática Datenverarbeitung Computer security Electronic data processing Distributed processing Dezentrale Datenverarbeitung (DE-588)7545389-7 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Verteiltes System (DE-588)4238872-7 s DE-604 Dezentrale Datenverarbeitung (DE-588)7545389-7 s 1\p DE-604 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016476012&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Anderson, Ross 1956-2024 Security engineering a guide to building dependable distributed systems Seguridad Informática Datenverarbeitung Computer security Electronic data processing Distributed processing Dezentrale Datenverarbeitung (DE-588)7545389-7 gnd Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7545389-7 (DE-588)4238872-7 (DE-588)4274324-2 |
title | Security engineering a guide to building dependable distributed systems |
title_auth | Security engineering a guide to building dependable distributed systems |
title_exact_search | Security engineering a guide to building dependable distributed systems |
title_exact_search_txtP | Security engineering a guide to building dependable distributed systems |
title_full | Security engineering a guide to building dependable distributed systems Ross J. Anderson |
title_fullStr | Security engineering a guide to building dependable distributed systems Ross J. Anderson |
title_full_unstemmed | Security engineering a guide to building dependable distributed systems Ross J. Anderson |
title_short | Security engineering |
title_sort | security engineering a guide to building dependable distributed systems |
title_sub | a guide to building dependable distributed systems |
topic | Seguridad Informática Datenverarbeitung Computer security Electronic data processing Distributed processing Dezentrale Datenverarbeitung (DE-588)7545389-7 gnd Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Seguridad Informática Datenverarbeitung Computer security Electronic data processing Distributed processing Dezentrale Datenverarbeitung Verteiltes System Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016476012&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT andersonross securityengineeringaguidetobuildingdependabledistributedsystems |