Эротические рассказы

Security Engineering. Ross AndersonЧитать онлайн книгу.

Security Engineering - Ross  Anderson


Скачать книгу
ction>

      Table of Contents

      1  Cover

      2  Title Page

      3  Preface to the Third Edition

      4  Preface to the Second Edition

      5  Preface to the First Edition

      6  For my daughter, and other lawyers…

      7  Foreword

      8  PART I CHAPTER 1: What Is Security Engineering? 1.1 Introduction 1.2 A framework 1.3 Example 1 – a bank 1.4 Example 2 – a military base 1.5 Example 3 – a hospital 1.6 Example 4 – the home 1.7 Definitions 1.8 Summary Note CHAPTER 2: Who Is the Opponent? 2.1 Introduction 2.2 Spies 2.3 Crooks 2.4 Geeks 2.5 The swamp 2.6 Summary Research problems Further reading Notes CHAPTER 3: Psychology and Usability 3.1 Introduction 3.2 Insights from psychology research 3.3 Deception in practice 3.4 Passwords 3.5 CAPTCHAs 3.6 Summary Research problems Further reading Notes CHAPTER 4: Protocols 4.1 Introduction 4.2 Password eavesdropping risks 4.3 Who goes there? – simple authentication 4.4 Manipulating the message 4.5 Changing the environment 4.6 Chosen protocol attacks 4.7 Managing encryption keys 4.8 Design assurance 4.9 Summary Research problems Further reading Notes CHAPTER 5: Cryptography 5.1 Introduction 5.2 Historical background 5.3 Security models 5.4 Symmetric crypto algorithms 5.5 Modes of operation 5.6 Hash functions 5.7 Asymmetric crypto primitives 5.8 Summary Research problems Further reading Notes CHAPTER 6: Access Control 6.1 Introduction 6.2 Operating system access controls 6.3 Hardware protection 6.4 What goes wrong 6.5 Summary Research problems Further reading Notes CHAPTER 7: Distributed Systems 7.1 Introduction 7.2 Concurrency 7.3 Fault tolerance and failure recovery 7.4 Naming 7.5 Summary Research problems Further


Скачать книгу
Яндекс.Метрика