- 相关
- 目录
- 笔记
- 书签
- Title Page
- Copyright Page
- Contents
- Foreword
- Preface
- About the Authors
- 1. Security Blanket or Security Theater?
- 2. Knock, Knock. Who’s There?
- 3. 2 + 2 = 5
- 4. A Horse of a Different Color
- 5. The Keys to the Kingdom
- Interlude A: Cloud Computing
- 6. My Cup Runneth Over
- 7. He Who Steals My Purse ...
- 8. The Root of All Evil
- 9. Scanning the Horizon
- 10. Do You Hear What I Hear?
- 11. I Hear You Loud and Clear
- Interlude B: Electronic Voting
- 12. Disregard That Man behind the Curtain
- 13. Not All Is as It Seems
- 14. Play It [Again] Sam, or, Let’s Look at the Instant Replay
- 15. I Can’t Get No Satisfaction
- Interlude C: Cyber Warfare
- 16. ‘Twas Brillig, and the Slithy Toves ...
- 17. Peering through the Window
- 18. My 100,000 Nearest and Dearest Friends
- Afterword
- Bibliography
- Index
- Code Snippets
暂无笔记
选择文本,点击鼠标右键菜单,添加笔记
暂无书签
在左侧文档中,点击鼠标右键,添加书签
2011版-Analyzing Computer Security A Threat Vulnerability Countermeasure Approach
格式:PDF
页数:1139
上传日期:2018-09-11 07:09:55
浏览次数:13
下载积分:4000
加入阅读清单
0%