MainScienceMathApplications › Security Engineering

Security Engineering

Edit Page
Report
Scan day: 05 March 2014 UTC
26
Virus safety - good
Description: Anderson, Explains how "pure" cryptography is not quite so pure when expressed in the context of real world applications. Includes sample chapters of the second edition, entire contents of the first edition in PDF and audio format, errata, and supplemental notes and links.
Security Engineering - A Guide to Building Dependable Distributed Systems Security Engineering — The Book ‘I'm incredibly impressed that one person could produce such a thorough coverage. Moreover, you make the stuff easy and enjoyable to read. I find it just as entertaining — and far more useful — than novels (and my normal science fiction). When I first got it in the mail, I said to myself "I'm never going to read all of that." But once I started reading I just kept going and going. Fantastic: well done. Now, let's hope that all those in charge of security for information technology will also read the book and heed the lessons.’
Size: 713 chars

Contact Information

Email:
Phone&Fax:
Address:
Extended:

WEBSITE Info

Page title:Security Engineering - A Guide to Building Dependable Distributed Systems
Keywords:
Description:
IP-address:128.232.0.20