security-engineering-ebook/meta.txt

135 lines
3.0 KiB
Plaintext
Raw Normal View History

2020-01-31 21:36:15 +00:00
InfoBegin
InfoKey: Title
InfoValue: Security Engineering — Third Edition
InfoBegin
InfoKey: Author
InfoValue: Ross Anderson
2020-01-31 21:25:44 +00:00
BookmarkBegin
BookmarkTitle: Cover
BookmarkLevel: 1
BookmarkPageNumber: 1
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: Preface
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
BookmarkPageNumber: 2
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 1. What is Security Engineering?
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
BookmarkPageNumber: 4
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 2. Who is the Opponent?
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 17
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 3. Psychology and Usability
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 57
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 4. Protocols
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 105
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 5. Cryptography
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 128
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 6. Access Control
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 182
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 7. Distributed Systems
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 213
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 8. Economics
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 240
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 9. Multilevel Security
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 274
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 10. Boundaries
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 297
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 11. Inference Control
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 326
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 12. Banking and Bookkeeping
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 351
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 13. Physical Protection
2020-02-03 07:45:39 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 409
2020-02-03 07:45:39 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 14. Monitoring and Metering
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 432
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 15. Nuclear Command and Control
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 460
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 16. Security Printing and Seals
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 477
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 17. Biometrics
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 497
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 18. Physical Tamper Resistance
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 522
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 19. Side Channels
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 557
2020-01-31 21:25:44 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 20. Advanced Cryptographic Engineering
2020-01-31 21:25:44 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 581
2020-02-01 15:15:23 +00:00
BookmarkBegin
2020-04-27 03:53:51 +00:00
BookmarkTitle: 21. Network Attack and Defence
2020-02-01 15:15:23 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 609
2020-04-27 03:53:51 +00:00
BookmarkBegin
2020-06-04 07:41:12 +00:00
BookmarkTitle: 22. Phones
2020-04-27 03:53:51 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 642
2020-04-27 03:53:51 +00:00
BookmarkBegin
2020-06-04 07:41:12 +00:00
BookmarkTitle: 23. Electronic and Information Warfare
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 677
2020-06-04 07:41:12 +00:00
BookmarkBegin
BookmarkTitle: 24: Copyright and DRM
2020-05-23 16:24:31 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 710
BookmarkBegin
BookmarkTitle: 25: Taking Stock
BookmarkLevel: 1
BookmarkPageNumber: 752
2020-05-23 16:24:31 +00:00
BookmarkBegin
BookmarkTitle: 26. Surveillance or Privacy?
2020-07-11 07:51:00 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 788
2020-07-11 07:51:00 +00:00
BookmarkBegin
BookmarkTitle: 27. Secure Systems Development
2020-04-27 03:53:51 +00:00
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 836
BookmarkBegin
BookmarkTitle: 28. Assurance and Sustainability
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 879
BookmarkBegin
BookmarkTitle: 29. Beyond “Computer Says No”
BookmarkLevel: 1
BookmarkPageNumber: 918
2020-07-24 07:18:33 +00:00
BookmarkBegin
BookmarkTitle: Bibliography
BookmarkLevel: 1
2020-09-02 07:55:29 +00:00
BookmarkPageNumber: 920