-
-
[下载]Security Engineering: A Guide to Building Dependable Distributed Systems 合并成单一pdf
-
发表于: 2013-5-6 10:13 1657
-
[下载]Security Engineering: A Guide to Building Dependable Distributed Systems 合并成单一pdf
2013-5-6 10:13
1657
Security Engineering — The Book
前天在论坛看到有朋友给出了这个链接:http://www.cl.cam.ac.uk/~rja14/book.html
我下载了合并了下。
在此提供给大家下载。
All chapters from the second edition now available free online!
•Table of contents
•Preface
•Acknowledgements
•Chapter 1: What is Security Engineering?
•Chapter 2: Usability and Psychology
•Chapter 3: Protocols
•Chapter 4: Access Control
•Chapter 5: Cryptography
•Chapter 6: Distributed Systems
•Chapter 7: Economics
•Chapter 8: Multilevel Security
•Chapter 9: Multilateral Security
•Chapter 10: Banking and Bookkeeping
•Chapter 11: Physical Protection
•Chapter 12: Monitoring and Metering
•Chapter 13: Nuclear Command and Control
•Chapter 14: Security Printing and Seals
•Chapter 15: Biometrics
•Chapter 16: Physical Tamper Resistance
•Chapter 17: Emission Security
•Chapter 18: API Security
•Chapter 19: Electronic and Information Warfare
•Chapter 20: Telecom System Security
•Chapter 21: Network Attack and Defence
•Chapter 22: Copyright and DRM
•Chapter 23: The Bleeding Edge
•Chapter 24: Terror, Justice and Freedom
•Chapter 25: Managing the Development of Secure Systems
•Chapter 26: System Evaluation and Assurance
•Chapter 27: Conclusions
•Bibliography
•Index
When I wrote the first edition, we put the chapters online free after four years and found that this boosted sales of the paper edition. People would find a useful chapter online and then buy the book to have it as a reference. Wiley and I agreed to do the same with the second edition, and now, four years after publication, I am putting all the chapters online for free. Enjoy them – and I hope you'll buy the paper version to have as a conveient shelf reference:
•Buy from Amazon.com
•Buy from Wiley
•Buy from Amazon.co.uk (Kindle version)
Here are the errata for the second edition, and here's a page of notes and links concerning relevant topics that I've come across since publication.
Supplementary materials: If you're a college professor thinking of using my book in class, note that we use my book in three courses at Cambridge:
•the first part in second-year Introduction to Security (course material and past exam questions)
• the second in third-year Security (course material and questions), and
•the third part in our second-year Software Engineering (course, questions and still more questions).
I hope you find these useful. You're welcome to use and adapt any of my slides if you wish under this Creative Commons license. Also, if you're an instructor at an accredited institution, you can request an evaluation copy via Wiley's website.
http://www.amazon.com/exec/obidos/ASIN/0470068523/rossandersshomep
http://www.cl.cam.ac.uk/~rja14/book.html
前天在论坛看到有朋友给出了这个链接:http://www.cl.cam.ac.uk/~rja14/book.html
我下载了合并了下。
在此提供给大家下载。
All chapters from the second edition now available free online!
•Table of contents
•Preface
•Acknowledgements
•Chapter 1: What is Security Engineering?
•Chapter 2: Usability and Psychology
•Chapter 3: Protocols
•Chapter 4: Access Control
•Chapter 5: Cryptography
•Chapter 6: Distributed Systems
•Chapter 7: Economics
•Chapter 8: Multilevel Security
•Chapter 9: Multilateral Security
•Chapter 10: Banking and Bookkeeping
•Chapter 11: Physical Protection
•Chapter 12: Monitoring and Metering
•Chapter 13: Nuclear Command and Control
•Chapter 14: Security Printing and Seals
•Chapter 15: Biometrics
•Chapter 16: Physical Tamper Resistance
•Chapter 17: Emission Security
•Chapter 18: API Security
•Chapter 19: Electronic and Information Warfare
•Chapter 20: Telecom System Security
•Chapter 21: Network Attack and Defence
•Chapter 22: Copyright and DRM
•Chapter 23: The Bleeding Edge
•Chapter 24: Terror, Justice and Freedom
•Chapter 25: Managing the Development of Secure Systems
•Chapter 26: System Evaluation and Assurance
•Chapter 27: Conclusions
•Bibliography
•Index
When I wrote the first edition, we put the chapters online free after four years and found that this boosted sales of the paper edition. People would find a useful chapter online and then buy the book to have it as a reference. Wiley and I agreed to do the same with the second edition, and now, four years after publication, I am putting all the chapters online for free. Enjoy them – and I hope you'll buy the paper version to have as a conveient shelf reference:
•Buy from Amazon.com
•Buy from Wiley
•Buy from Amazon.co.uk (Kindle version)
Here are the errata for the second edition, and here's a page of notes and links concerning relevant topics that I've come across since publication.
Supplementary materials: If you're a college professor thinking of using my book in class, note that we use my book in three courses at Cambridge:
•the first part in second-year Introduction to Security (course material and past exam questions)
• the second in third-year Security (course material and questions), and
•the third part in our second-year Software Engineering (course, questions and still more questions).
I hope you find these useful. You're welcome to use and adapt any of my slides if you wish under this Creative Commons license. Also, if you're an instructor at an accredited institution, you can request an evaluation copy via Wiley's website.
http://www.amazon.com/exec/obidos/ASIN/0470068523/rossandersshomep
http://www.cl.cam.ac.uk/~rja14/book.html
链接:http://pan.baidu.com/share/link?shareid=520432&uk=539163738 密码:qfc5
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
看原图
赞赏
雪币:
留言: