security-engineering-ebook/book.md

66 lines
3.5 KiB
Markdown

title: Security Engineering — Third Edition
author: Ross Anderson
[Cover](cover.pdf)
[Preface](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-pref-May16.pdf)
[1. What is Security Engineering?](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch1-7sep.pdf)
[2. Who is the Opponent?](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch2-7sep.pdf)
[3. Psychology and Usability](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch3-7sep.pdf)
[4. Protocols](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch4-7sep.pdf)
[5. Cryptography](https://web.archive.org/web/20201018090028if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch5-7sep.pdf)
[6. Access Control](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch6-7sep.pdf)
[7. Distributed Systems](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch7-7sep.pdf)
[8. Economics](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch8-7sep.pdf)
[9. Multilevel Security](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch9-7sep.pdf)
[10. Boundaries](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch10-7sep.pdf)
[11. Inference Control](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch11-7sep.pdf)
[12. Banking and Bookkeeping](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch12-7sep.pdf)
[13. Physical Protection](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch13-7sep.pdf)
[14. Monitoring and Metering](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch14-7sep.pdf)
[15. Nuclear Command and Control](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch15-7sep.pdf)
[16. Security Printing and Seals](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch16-7sep.pdf)
[17. Biometrics](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch17-7sep.pdf)
[18. Physical Tamper Resistance](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch18-7sep.pdf)
[19. Side Channels](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch19-7sep.pdf)
[20. Advanced Cryptographic Engineering](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch20-7sep.pdf)
[21. Network Attack and Defence](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch21-7sep.pdf)
[22. Phones](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch22-7sep.pdf)
[23. Electronic and Information Warfare](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch23-7sep.pdf)
[24: Copyright and DRM](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch24-7sep.pdf)
[25: Taking Stock](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch25-7sep.pdf)
[26. Surveillance or Privacy?](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch26-7sep.pdf)
[27. Secure Systems Development](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch27-7sep.pdf)
[28. Assurance and Sustainability](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch28-7sep.pdf)
[29. Beyond “Computer Says No”](https://web.archive.org/web/2021if_/https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch29-7sep.pdf)
[Bibliography](https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-bib-7sep.pdf)