|
|
|
|
LEADER |
02880cmm a2200493 i 4500 |
001 |
ebook-272710717 |
005 |
20231111013100.0 |
007 |
cu|uuu---uuuuu |
008 |
231020s2020||||us ||||g|||| ||||||eng d |
020 |
|
|
|a 9781119642831
|
035 |
|
|
|a (OCoLC)1408801001
|
035 |
|
|
|a FRCYB88945341
|
035 |
|
|
|a FRCYB084688945341
|
035 |
|
|
|a FRCYB087088945341
|
035 |
|
|
|a FRCYB087588945341
|
035 |
|
|
|a FRCYB24788945341
|
035 |
|
|
|a FRCYB24888945341
|
035 |
|
|
|a FRCYB26088945341
|
035 |
|
|
|a FRCYB29388945341
|
035 |
|
|
|a FRCYB56788945341
|
040 |
|
|
|a ABES
|b fre
|e AFNOR
|
041 |
0 |
|
|a eng
|2 639-2
|
082 |
0 |
|
|a 005.1
|2 22
|
100 |
1 |
|
|0 (IdRef)112029655
|1 http://www.idref.fr/112029655/id
|a Anderson, Ross
|d (1956-....).
|4 aut.
|e Auteur
|
245 |
1 |
0 |
|a Security engineering :
|b a guide to building dependable distributed systems
|c Ross J. Anderson.
|
264 |
|
1 |
|a Indianapolis, IN :
|b Wiley Publishing, inc.
|
264 |
|
2 |
|a Paris :
|b Cyberlibris,
|c 2020.
|
336 |
|
|
|b txt
|2 rdacontent
|
337 |
|
|
|b c
|2 rdamedia
|
337 |
|
|
|b b
|2 isbdmedia
|
338 |
|
|
|b ceb
|2 RDAfrCarrier
|
500 |
|
|
|a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781119642831.jpg).
|
504 |
|
|
|a Bibliogr. p. 1143-1182. Index.
|
506 |
|
|
|a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement
|e Cyberlibris
|
559 |
2 |
|
|b Chapter 1 What Is Security Engineering?
|b Chapter 2 Who Is the Opponent?
|b Chapter 3 Psychology and Usability
|b Chapter 4 Protocols
|b Chapter 5 Cryptography
|b Chapter 6 Access Control
|b Chapter 7 Distributed Systems
|b Chapter 8 Economics
|b Chapter 9 Multilevel Security
|b Chapter 10 Boundaries
|b Chapter 11 Inference Control
|b Chapter 12 Banking and Bookkeeping
|b Chapter 13 Locks and Alarms
|b Chapter 14 Monitoring and Metering
|b Chapter 15 Nuclear Command and Control
|b Chapter 16 Security Printing and Seals
|b Chapter 17 Biometrics
|b Chapter 18 Tamper Resistance
|b Chapter 19 Side Channels
|b Chapter 20 Advanced Cryptographic Engineering
|b Chapter 21 Network Attack and Defence
|b Chapter 22 Phones
|b Chapter 23 Electronic and Information Warfare
|b Chapter 24 Copyright and DRM
|b Chapter 25 New Directions?
|b Chapter 26 Surveillance or Privacy?
|b Chapter 27 Secure Systems Development
|b Chapter 28 Assurance and Sustainability
|b Chapter 29 Beyond "Computer Says No
|
650 |
|
7 |
|0 (IdRef)027248062
|1 http://www.idref.fr/027248062/id
|a Systèmes informatiques
|x Mesures de sûreté.
|2 ram
|
650 |
|
7 |
|0 (IdRef)033861250
|1 http://www.idref.fr/033861250/id
|a Chiffrement (informatique).
|2 ram
|
650 |
|
0 |
|a Computer security.
|2 lc
|
650 |
|
0 |
|a Electronic data processing
|x Distributed processing.
|2 lc
|
856 |
|
|
|q HTML
|u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88945341
|w Données éditeur
|z Accès à l'E-book
|
886 |
2 |
|
|2 unimarc
|a 181
|a i#
|b xxxe##
|
993 |
|
|
|a E-Book
|
994 |
|
|
|a BNUM
|
995 |
|
|
|a 272710717
|