2020-04-27 03:53:51 +00:00
|
|
|
Preface
|
|
|
|
1. What is Security Engineering?
|
|
|
|
2. Who is the Opponent?
|
|
|
|
3. Psychology and Usability
|
|
|
|
4. Protocols
|
|
|
|
5. Cryptography
|
|
|
|
6. Access Control
|
|
|
|
7. Distributed Systems
|
|
|
|
8. Economics
|
|
|
|
9. Multilevel Security
|
|
|
|
10. Boundaries
|
|
|
|
11. Inference Control
|
|
|
|
12. Banking and Bookkeeping
|
|
|
|
13. Physical Protection
|
|
|
|
14. Monitoring and Metering
|
|
|
|
15. Nuclear Command and Control
|
|
|
|
16. Security Printing and Seals
|
|
|
|
17. Biometrics
|
|
|
|
18. Physical Tamper Resistance
|
|
|
|
19. Side Channels
|
|
|
|
20. Advanced Cryptographic Engineering
|
|
|
|
21. Network Attack and Defence
|
2020-06-04 07:41:12 +00:00
|
|
|
22. Phones
|
2020-05-23 16:24:31 +00:00
|
|
|
23. Electronic and Information Warfare
|
2020-08-04 14:39:55 +00:00
|
|
|
24: Copyright and DRM
|
2020-09-02 07:55:29 +00:00
|
|
|
25: Taking Stock
|
2020-08-04 14:39:55 +00:00
|
|
|
26. Surveillance or Privacy?
|
|
|
|
27. Secure Systems Development
|
|
|
|
28. Assurance and Sustainability
|
2020-09-02 07:55:29 +00:00
|
|
|
29. Beyond “Computer Says No”
|
2020-04-27 03:53:51 +00:00
|
|
|
Bibliography
|