Security Engineering. Ross AndersonЧитать онлайн книгу.
Summary Research problems Further reading Notes CHAPTER 16: Security Printing and Seals 16.1 Introduction 16.2 History 16.3 Security printing 16.4 Packaging and seals 16.5 Systemic vulnerabilities 16.6 Evaluation methodology 16.7 Summary Research problems Further reading CHAPTER 17: Biometrics 17.1 Introduction 17.2 Handwritten signatures 17.3 Face recognition 17.4 Fingerprints 17.5 Iris codes 17.6 Voice recognition and morphing 17.7 Other systems 17.8 What goes wrong 17.9 Summary Research problems Further reading Notes CHAPTER 18: Tamper Resistance 18.1 Introduction 18.2 History 18.3 Hardware security modules 18.4 Evaluation 18.5 Smartcards and other security chips 18.6 The residual risk 18.7 So what should one protect? 18.8 Summary Research problems Further reading Notes CHAPTER 19: Side Channels 19.1 Introduction 19.2 Emission security 19.3 Passive attacks 19.4 Attacks between and within computers 19.5 Environmental side channels 19.6 Social side channels 19.7 Summary Research problems Further reading CHAPTER 20: Advanced Cryptographic Engineering 20.1 Introduction 20.2 Full-disk encryption 20.3 Signal 20.4 Tor 20.5 HSMs 20.6 Enclaves 20.7 Blockchains 20.8 Crypto dreams that failed 20.9 Summary Research problems Further reading Notes CHAPTER 21: Network Attack and Defence 21.1 Introduction 21.2 Network protocols and service denial 21.3 The malware menagerie – Trojans, worms and RATs 21.4 Defense against network attack 21.5 Cryptography: the ragged boundary 21.6 CAs and PKI 21.7 Topology 21.8 Summary Research problems Further reading Notes CHAPTER 22: Phones 22.1 Introduction 22.2 Attacks on phone networks 22.3 Going mobile 22.4 Platform security 22.5 Summary Research problems Further reading Notes CHAPTER 23: Electronic and Information