MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
090412s2008 inu b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2008006392 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780470068526 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u1399 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.1 |
| Edition number |
22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Anderson, Ross, |
| Dates associated with a name |
1956- |
| 9 (RLIN) |
142 |
| 245 10 - TITLE STATEMENT |
| Title |
Security engineering : |
| Remainder of title |
a guide to building dependable distributed systems / |
| Statement of responsibility, etc. |
Ross J Anderson. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
2nd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Indianapolis, IN : |
| Name of publisher, distributor, etc. |
Wiley Technology Pub., |
| Date of publication, distribution, etc. |
2008. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xi, 1040 p. ; |
| Dimensions |
26 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1 What Is Security Engineering? -- Chapter 2 Usability and Psychology -- Chapter 3 Protocols -- Chapter 4 Access Control -- Chapter 5 Cryptography -- Chapter 6 Distributed Systems -- Chapter 7 Economics -- Chapter 8 Multilevel Security -- Chapter 9 Multilateral Security -- Chapter 10 Banking and Bookkeeping -- Chapter 11 Physical Protection -- Chapter 12 Monitoring and Metering -- Chapter 13 Nuclear Command and Control --Chapter 14 Security Printing and Seals -- Chapter 15 Biometrics -- Chapter 16 Physical Tamper Resistance -- Chapter 17 Emission Security -- Chapter 18 API Attacks -- Chapter 19 Electronic and Information Warfare -- Chapter 20 Telecom System Security -- Chapter 21 Network Attack and Defense --Chapter 22 Copyright and DRM --Chapter 23 The Bleeding Edge -- Chapter 24 Terror, Justice and Freedom -- Chapter 25 Managing the Development of Secure Systems -- Chapter 26 System Evaluation and Assurance -- Chapter 27 Conclusions -- Bibliography. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 9 (RLIN) |
1492 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Electronic data processing |
| General subdivision |
Distributed processing. |
| 9 (RLIN) |
60 |