It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 04047cam 2200673 a 4500
001 ocn192045774
003 OCoLC
005 20211205203039.0
008 080211s2008 inua b 001 0 eng
010 $a 2008006392
040 $aDLC$beng$cDLC$dBAKER$dBTCTA$dYDXCP$dC#P$dYBM$dU6C$dHEBIS$dDEBBG$dOCL$dBDX$dUKBOL$dOCLCF$dOCLCQ$dS3O$dOCLCQ$dICN$dLND$dOCLCO$dDOS$dOCLCA$dPAU$dOCLCQ$dCCH$dOCLCA$dOCLCQ$dOCLCO$dAU@$dOCLCO$dUKMGB$dOCLCQ$dAZZPT$dOCLCQ$dMM9$dIL4J6$dOCLCO$dOCLCQ$dUKEHC$dUCIDS$dOCLCO$dOCLCQ
015 $aGBA800232$2bnb
016 7 $a014475946$2Uk
019 $a154798563$a857537563$a972893858$a973018743$a1057084425$a1110948323$a1251404671
020 $a9780470068526$q(cloth)
020 $a0470068523$q(cloth)
035 $a(OCoLC)192045774$z(OCoLC)154798563$z(OCoLC)857537563$z(OCoLC)972893858$z(OCoLC)973018743$z(OCoLC)1057084425$z(OCoLC)1110948323$z(OCoLC)1251404671
050 00 $aQA76.9.A25$bA54 2008
082 00 $a005.1$222
084 $aST 273$2rvk
084 $aST 276$2rvk
084 $aST 277$2rvk
086 0 $aCIS3103
100 1 $aAnderson, Ross,$d1956-
245 10 $aSecurity engineering :$ba guide to building dependable distributed systems /$cRoss J. Anderson.
250 $a2nd ed.
260 $aIndianapolis, IN :$bWiley Pub.,$c©2008.
300 $axl, 1040 pages :$billustrations ;$c25 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references (pages 893-996) and index.
505 0 $aWhat is security engineering? -- Usability and psychology -- Protocols -- Access control -- Cryptography -- Distributed systems -- Economics -- Multilevel security -- Multilateral security -- Banking and bookkeeping -- Physical protection -- Monitoring and metering -- Nuclear command and control -- Security printing and seals -- Biometrics -- Physical tamper resistance -- Emission security -- API attacks -- Electronic and information warfare -- Telecom system security -- Network attack and defense -- Copyright and DRM -- The bleeding edge -- Terror, justice and freedom -- Managing the development of secure systems -- System evaluation and assurance.
520 $aThis reference guide to creating high quality security software covers the complete suite of security applications referred to as end2end security. It illustrates basic concepts of security engineering through real-world examples.
650 0 $aComputer security.
650 0 $aElectronic data processing$xDistributed processing.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aElectronic data processing$xDistributed processing.$2fast$0(OCoLC)fst00906987
650 7 $aComputersicherheit$2gnd
650 7 $aVerteiltes System$2gnd
650 7 $aComputer security.$2nli
650 7 $aElectronic data processing$xDistributed processing.$2nli
650 7 $aIT-säkerhet.$2sao
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/enhancements/fy0827/2008006392-t.html
856 41 $3Table of contents$uhttp://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016476012&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
856 41 $3Table of contents$uhttp://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016476012&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
856 41 $uhttp://catalogue.londonmet.ac.uk/record=b1685756~S1$zE-book
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy0827/2008006392-d.html
938 $aBaker & Taylor$bBKTY$c70.00$d70.00$i0470068523$n0007291408$sactive
938 $aBrodart$bBROD$n07092202$c$75.00
938 $aBaker and Taylor$bBTCP$nBK0007291408
938 $aYBP Library Services$bYANK$n2759457
029 1 $aDEBBG$bBV023291403
029 1 $aHEBIS$b206492871
029 1 $aNZ1$b12066339
029 1 $aUKMGB$b014475946
029 1 $aUNITY$b11035608X
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 355 OTHER HOLDINGS