|
|
|
|
| LEADER |
01909nam a2200325a 44500 |
| 001 |
UBP13904 |
| 003 |
AR-CdUBP |
| 005 |
20220310161034.0 |
| 008 |
110407s2008 us a g 001 eng d |
| 020 |
|
|
|a 978-0-470-06852-6
|
| 040 |
|
|
|a AR-CdUBP
|b spa
|
| 041 |
|
|
|a eng
|
| 100 |
|
|
|a Anderson, Ross
|
| 245 |
1 |
0 |
|a Security engineering :
|b a guide to building dependable distributed systems /
|c Ross J. Anderson.
|
| 250 |
|
|
|a 2nd. ed.
|
| 260 |
|
|
|a Indianopolis :
|b Wiley,
|c 2008.
|
| 300 |
|
|
|a xl, 1040 p. ;
|c 24 cm.
|
| 500 |
|
|
|a La Biblioteca posee: 2 ej.
|
| 504 |
|
|
|a Bibliografía: p. 893-996.
|
| 505 |
0 |
|
|a Part I. Chapter 1. What is security engineering?. - Chapter 2. Usability and psychology. - Chapter 3. Protocols. - Chapter 4. Access control. - Chapter 5. Criptography. - Chapter 6. Distributed systems. - Chapter 7. Economics. - Part II. Chapter 8. Multilevel security. - Chapter 9. Multilateral security. - Chapter 10. Banking and bookkeeping. - Chapter 11. Physical protection. - Chapter 12. Monitoring and metering. - Chapter 13. Nuclear command and control. - Chapter 14. Securiting printing and seals. - Chapter 15. Biometrics. - Chapter 16. Physical tamper resistance. - Chapter 17. Emission security. - Chapter 18. API attacks. - Chapter 19. Electronic and information warfare. - Chapter 20. Telecom system security. - Chapter 21. Network attack and defense. - Chapter 22. Copyright and DRM. - Chapter 23. The bleeding edge. - Part III. Chapter 24. Terror, justice and freedom. - Chapter 25. Managing the development of secure systems. - Chapter 26. System evaluation and assurance. - Chapter 27. Conclusions.
|
| 650 |
|
4 |
|a SEGURIDAD INFORMATICA
|
| 653 |
|
|
|a TELECOMUNICACIONES
|
| 653 |
|
|
|a INFORMATICA
|
| 930 |
|
|
|a INFORMATICA
|
| 930 |
|
|
|a TELECOMUNICACIONES
|
| 931 |
|
|
|a 13904
|b UBP
|
| 942 |
|
|
|2 cdu
|c BK
|
| 945 |
|
|
|a NNM
|
| 984 |
|
|
|a 004.056.53
|b An23s2
|
| 999 |
|
|
|c 28908
|d 28908
|