ExLibris header image
SFX Logo
Source:

Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition [0-470-06852-3; 1-118-00836-7] Anderson, Ross

yr:2008 pg:XL -1040S.:Ill.,graph.Darst.

Collapse list of basic services Basic
Sorry, no full text available...
Please use the document delivery service (see below)  
Document delivery
Request document via Library/Bibliothek GO
Citation information
Check Google Book Search GO
Users interested in this article also expressed an interest in the following:
1. Harris, S. CISSP All-in-One Exam Guide, 6th Edition. Link to SFX for this item
2. Harris, S. CISSP. 2008. Link to SFX for this item
3. Schneier, B. Applied cryptography: protocols, algorithms, and source code in C. 1995. Link to SFX for this item
4. Die, W. "New directions in cryptography." IEEE transactions on information theory 22.6 (1976): 644-654. Link to SFX for this item
5. Johnston, M. "Syndromes of Corruption." Syndromes of corruption : wealth, power, and democracy /. Cambridge University Press,, 2005. 1-267. Link to SFX for this item
6. Schneier, Bruce K. Applied cryptography: protocols, algorithms, and source code in C. Wiley,, 2015. Link to SFX for this item
7. Basin, D. "Applied information security." Applied Information Security. 2011. Link to SFX for this item
8. Rivest, R. L. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126. Link to SFX for this item
9. Karklins, R. "Syndromes of Corruption: Wealth, Power, and Democracy Syndromes of Corruption: Wealth, Power, and Democracy. By Michael Johnston.(Cambridge University Press, 2005.)." The Journal of politics 69.01 (2008): 260-261. Link to SFX for this item
10. Ekert, Artur K. "Quantum cryptography based on Bell's theorem." Physical review letters 67.6 (1991): 661-663. Link to Full Text for this item Link to SFX for this item
11. Vinod, V. Application Security in the ISO27001 Environment. Link to SFX for this item
12. Harris, S. CISSPĀ® All-in-One Exam Guide, Fifth Edition. Link to SFX for this item
13. McNab, C. Network Security Assessment, 2nd Edition. Link to SFX for this item
14. Arce, M. "Resource Wealth, Democracy and Mobilisation." The journal of development studies 54.6: 949-967. Link to SFX for this item
15. Lipford, J. "Determining Economic Freedom: Democracy, Political Competition, and the Wealth Preservation Struggle." Journal of Private Enterprise 30.3 (2015): 1-18. Link to SFX for this item
16. You, J. Democracy, Inequality and Corruption. 2014. Link to SFX for this item
17. Harris, S. CISSP practice exams. Link to SFX for this item
18. Poole, O. "Network Security." Network Security : A Practical Guide. 2003. Link to SFX for this item
19. Andrew, ANDREW T. Computer Networks (5th Edition). Link to SFX for this item
20. Whittaker, James A. Exploratory software testing. 2009. Link to SFX for this item
View More...
View Less...
Select All Clear All

Expand list of advanced services Advanced