Security Engineering: A Guide To Building Dependable Distributed Systems Engineering
User Manual:
Open the PDF directly: View PDF
Page Count: 1083 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Cover
- Title Page
- Copyright
- Contents
- Preface to the Second Edition
- Foreword by Bruce Schneier
- Preface
- Acknowledgments
- Part I
- Chapter 1 What Is Security Engineering?
- Chapter 2 Usability and Psychology
- Introduction
- Attacks Based on Psychology
- Insights from Psychology Research
- Passwords
- System Issues
- CAPTCHAs
- Summary
- Research Problems
- Further Reading
- Chapter 3 Protocols
- Chapter 4 Access Control
- Chapter 5 Cryptography
- Introduction
- Historical Background
- The Random Oracle Model
- Symmetric Crypto Primitives
- SP-Networks
- The Advanced Encryption Standard (AES)
- Feistel Ciphers
- Modes of Operation
- Hash Functions
- Asymmetric Crypto Primitives
- Cryptography Based on Factoring
- Cryptography Based on Discrete Logarithms
- Special Purpose Primitives
- Summary
- Research Problems
- Further Reading
- Chapter 6 Distributed Systems
- Chapter 7 Economics
- Part II
- Chapter 8 Multilevel Security
- Chapter 9 Multilateral Security
- Chapter 10 Banking and Bookkeeping
- Chapter 11 Physical Protection
- Chapter 12 Monitoring and Metering
- Chapter 13 Nuclear Command and Control
- Chapter 14 Security Printing and Seals
- Chapter 15 Biometrics
- Chapter 16 Physical Tamper Resistance
- Chapter 17 Emission Security
- Chapter 18 API Attacks
- Chapter 19 Electronic and Information Warfare
- Chapter 20 Telecom System Security
- Chapter 21 Network Attack and Defense
- Introduction
- Vulnerabilities in Network Protocols
- Trojans, Viruses, Worms and Rootkits
- Defense Against Network Attack
- Configuration Management and Operational Security
- Filtering: Firewalls, Spam Filters, Censorware and Wiretaps
- Intrusion Detection
- Specific Problems Detecting Network Attacks
- Encryption
- Topology
- Summary
- Research Problems
- Further Reading
- Chapter 22 Copyright and DRM
- Chapter 23 The Bleeding Edge
- Part III
- Chapter 24 Terror, Justice and Freedom
- Introduction
- Terrorism
- Surveillance
- The History of Government Wiretapping
- The Growing Controversy about Traffic Analysis
- Unlawful Surveillance
- Access to Search Terms and Location Data
- Data Mining
- Surveillance via ISPs —Carnivore and its Offspring
- Communications Intelligence on Foreign Targets
- Intelligence Strengths and Weaknesses
- The Crypto Wars
- Did the Crypto Wars Matter?
- Export Control
- Censorship
- Forensics and Rules of Evidence
- Privacy and Data Protection
- Summary
- Research Problems
- Further Reading
- Chapter 25 Managing the Development of Secure Systems
- Chapter 26 System Evaluation and Assurance
- Chapter 27 Conclusions
- Chapter 24 Terror, Justice and Freedom
- Bibliography
- Index
- EULA