Foundations of Security
File List
- Chapter 15 - MACs and Signatures.pdf 367.9 KB
- Chapter 09 - Password Security.pdf 275.1 KB
- Chapter 10 - Cross-Domain Security in Web Applications.pdf 270.0 KB
- Chapter 02 - Secure Systems Design.pdf 240.9 KB
- Chapter 08 - SQL Injection.pdf 206.0 KB
- back-matter.pdf 202.2 KB
- Chapter 07 - Client-State Manipulation.pdf 190.8 KB
- Chapter 06 - Buffer Overflows.pdf 165.9 KB
- Chapter 12 - Symmetric Key Cryptography.pdf 164.3 KB
- Chapter 01 - Security Goals.pdf 163.9 KB
- Chapter 13 - Asymmetric Key Cryptography.pdf 153.8 KB
- Chapter 14 - Key Management and Exchange.pdf 153.3 KB
- front-matter.pdf 141.3 KB
- Chapter 03 - Secure Design Principles.pdf 136.1 KB
- cover-large.gif 120.2 KB
- Chapter 05 - Worms and Other Malware.pdf 119.6 KB
- Chapter 11 - Exercises for Part 2.pdf 66.2 KB
- Chapter 16 - Exercises for Part 3.pdf 58.7 KB
- Chapter 04 - Exercises for Part 1.pdf 53.9 KB
- springer_url.txt 40 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.