Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Preface
1. Introduction
PART 1 THE LANDSCAPE
2. Digital Threats 3. Attacks 4. Adversaries 5. Security Needs
PART 2 TECHNOLOGIES
6. Cryptography 7. Cryptography in Context 8. Computer Security 9. Identification and Authentication 10. Networked-Computer Security 11. Network Security 12. Network Defenses 13. Software Reliability 14. Secure Hardware 15. Certificates and Credentials 16. Security Tricks 17. The Human Factor
PART 3 STRATEGIES
18. Vulnerabilities and the Vulnerability Landscape 19. Threat Modeling and Risk Assessment 20. Security Policies and Countermeasures 21. Attack Trees 22. Product Testing and Verification 23. The Future of Products 24. Security Processes 25. Conclusion
Afterword Resources Acknowledgments Crypto-Gram
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion