Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
Contents
List of Figures
Preface
Acknowledgments
About the Authors
Part I: History
1. Introduction
2. The Old Testament
3. Old Principles, New World
Part II: Security and the Modern Computing Landscape
4. OS Security
5. Network Security
6. Implementation Security
Part III: Building Blocks for Secure Systems
7. Using Cryptography
8. Subverting Cryptography
9. Authentication
10. Public Key Infrastructure
11. Standards, Compliance, and Testing
Part IV: Applications
12. The Web and Security
13. Office Tools and Security
14. Money, Time, Property
Part V: Emerging Tools
15. Formal Methods and Security
16. Hardware-Based Security
17. In Search of the Evil Bit
18. Human Issues
The Take-Home Lesson
A. Exiled Theory
Bibliography
Index
Footnotes
Preface
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Appendix A
← Prev
Back
Next →
← Prev
Back
Next →