Matches in Library of Congress for { <http://lccn.loc.gov/2008297394> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- 2008297394 contributor B11150929.
- 2008297394 contributor B11150930.
- 2008297394 created "c2007.".
- 2008297394 date "2007".
- 2008297394 date "c2007.".
- 2008297394 dateCopyrighted "c2007.".
- 2008297394 description "Includes bibliographical references (p. 267-275) and index.".
- 2008297394 description "Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulation -- SQL injection -- Password security -- Cross-domain security in web applications -- Exercises for part 2 -- Pt. 3. Introduction to cryptography -- Symmetric key crytography -- Asymmetric key cryptography -- Key management and exchange -- MACs and signatures -- Exercises for part 3.".
- 2008297394 extent "xxvii, 290 p. :".
- 2008297394 identifier "1590597842 (pbk.)".
- 2008297394 identifier "9781590597842 (pbk.)".
- 2008297394 isPartOf "The Expert's voice in security".
- 2008297394 issued "2007".
- 2008297394 issued "c2007.".
- 2008297394 language "eng".
- 2008297394 publisher "Berkeley, CA : Apress ; New York : Distributed to the book trade worldwide by Springer-Verlag,".
- 2008297394 subject "005.8 22".
- 2008297394 subject "Computer security.".
- 2008297394 subject "Data encryption (Computer science)".
- 2008297394 subject "QA76.76.P76 D37 2007".
- 2008297394 subject "Software protection.".
- 2008297394 tableOfContents "Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulation -- SQL injection -- Password security -- Cross-domain security in web applications -- Exercises for part 2 -- Pt. 3. Introduction to cryptography -- Symmetric key crytography -- Asymmetric key cryptography -- Key management and exchange -- MACs and signatures -- Exercises for part 3.".
- 2008297394 title "Foundations of security : what every programmer needs to know / Neil Daswani, Christoph Kern, and Anita Kesavan.".
- 2008297394 type "text".