Book description
NoneTable of contents
- Cover
- Title Page
- Preface to the Third Edition
- Preface to the Second Edition
- Preface to the First Edition
- For my daughter, and other lawyers…
- Foreword
- PART I
-
PART II
- CHAPTER 9: Multilevel Security
- CHAPTER 10: Boundaries
- CHAPTER 11: Inference Control
- CHAPTER 12: Banking and Bookkeeping
- CHAPTER 13: Locks and Alarms
- CHAPTER 14: Monitoring and Metering
- CHAPTER 15: Nuclear Command and Control
- CHAPTER 16: Security Printing and Seals
- CHAPTER 17: Biometrics
- CHAPTER 18: Tamper Resistance
- CHAPTER 19: Side Channels
- CHAPTER 20: Advanced Cryptographic Engineering
- CHAPTER 21: Network Attack and Defence
- CHAPTER 22: Phones
- CHAPTER 23: Electronic and Information Warfare
- CHAPTER 24: Copyright and DRM
- CHAPTER 25: New Directions?
- PART III
- Bibliography
- Index
- End User License Agreement
Product information
- Title: Security Engineering, 3rd Edition
- Author(s):
- Release date:
- Publisher(s): Wiley
- ISBN: None
You might also like
book
Security Chaos Engineering
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure …
book
Defensive Security Handbook, 2nd Edition
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have …
book
Computer Security Art and Science, 2nd Edition
The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In …
book
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have …