title: Security Engineering — Third Edition author: Ross Anderson [Cover](cover.pdf) [Preface](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-pref-May16.pdf) [1. What is Security Engineering?](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch1-7sep.pdf) [2. Who is the Opponent?](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch2-7sep.pdf) [3. Psychology and Usability](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch3-7sep.pdf) [4. Protocols](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch4-7sep.pdf) [5. Cryptography](https://web.archive.org/web/20201018090028if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch5-7sep.pdf) [6. Access Control](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch6-7sep.pdf) [7. Distributed Systems](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch7-7sep.pdf) [8. Economics](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch8-7sep.pdf) [9. Multilevel Security](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch9-7sep.pdf) [10. Boundaries](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch10-7sep.pdf) [11. Inference Control](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch11-7sep.pdf) [12. Banking and Bookkeeping](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch12-7sep.pdf) [13. Physical Protection](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch13-7sep.pdf) [14. Monitoring and Metering](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch14-7sep.pdf) [15. Nuclear Command and Control](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch15-7sep.pdf) [16. Security Printing and Seals](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch16-7sep.pdf) [17. Biometrics](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch17-7sep.pdf) [18. Physical Tamper Resistance](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch18-7sep.pdf) [19. Side Channels](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch19-7sep.pdf) [20. Advanced Cryptographic Engineering](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch20-7sep.pdf) [21. Network Attack and Defence](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch21-7sep.pdf) [22. Phones](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch22-7sep.pdf) [23. Electronic and Information Warfare](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch23-7sep.pdf) [24: Copyright and DRM](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch24-7sep.pdf) [25: Taking Stock](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch25-7sep.pdf) [26. Surveillance or Privacy?](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch26-7sep.pdf) [27. Secure Systems Development](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch27-7sep.pdf) [28. Assurance and Sustainability](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch28-7sep.pdf) [29. Beyond “Computer Says No”](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch29-7sep.pdf) [Bibliography](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-bib-7sep.pdf)