security-engineering-ebook/meta.txt

135 lines
3.0 KiB
Plaintext
Raw Normal View History

2020-01-31 21:36:15 +00:00
InfoBegin
InfoKey: Title
InfoValue: Security Engineering — Third Edition
InfoBegin
InfoKey: Author
InfoValue: Ross Anderson
2020-01-31 21:25:44 +00:00
BookmarkBegin
BookmarkTitle: Cover
BookmarkLevel: 1
BookmarkPageNumber: 1
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: Preface
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
BookmarkPageNumber: 2
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 1. What is Security Engineering?
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
BookmarkPageNumber: 4
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 2. Who is the Opponent?
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 17
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 3. Psychology and Usability
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 57
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 4. Protocols
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 107
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 5. Cryptography
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 131
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 6. Access Control
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 187
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 7. Distributed Systems
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 218
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 8. Economics
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 245
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 9. Multilevel Security
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 279
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 10. Boundaries
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 302
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 11. Inference Control
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 331
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 12. Banking and Bookkeeping
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 356
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 13. Physical Protection
2020-02-03 07:45:39 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 414
2020-02-03 07:45:39 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 14. Monitoring and Metering
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 437
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 15. Nuclear Command and Control
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 465
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 16. Security Printing and Seals
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 482
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 17. Biometrics
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 502
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 18. Physical Tamper Resistance
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 527
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 19. Side Channels
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 562
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 20. Advanced Cryptographic Engineering
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 586
2020-02-01 15:15:23 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 21. Network Attack and Defence
2020-02-01 15:15:23 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 615
2020-04-27 03:53:51 +00:00
BookmarkBegin
2020-06-04 07:41:12 +00:00
BookmarkTitle: 22. Phones
2020-04-27 03:53:51 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 648
2020-04-27 03:53:51 +00:00
BookmarkBegin
2020-06-04 07:41:12 +00:00
BookmarkTitle: 23. Electronic and Information Warfare
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 684
2020-06-04 07:41:12 +00:00
BookmarkBegin
BookmarkTitle: 24: Copyright and DRM
2020-05-23 16:24:31 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 717
2020-09-02 07:55:29 +00:00
BookmarkBegin
BookmarkTitle: 25: Taking Stock
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 761
2020-05-23 16:24:31 +00:00
BookmarkBegin
BookmarkTitle: 26. Surveillance or Privacy?
2020-07-11 07:51:00 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 798
2020-07-11 07:51:00 +00:00
BookmarkBegin
BookmarkTitle: 27. Secure Systems Development
2020-04-27 03:53:51 +00:00
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 846
BookmarkBegin
BookmarkTitle: 28. Assurance and Sustainability
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 889
2020-09-02 07:55:29 +00:00
BookmarkBegin
BookmarkTitle: 29. Beyond “Computer Says No”
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 928
2020-07-24 07:18:33 +00:00
BookmarkBegin
BookmarkTitle: Bibliography
BookmarkLevel: 1
2020-10-06 07:43:40 +00:00
BookmarkPageNumber: 930