Back to Results
First PageMeta Content
Crime prevention / Computer security / Computer network security / Information security / Security engineering / Physical security / Authentication / Access control / Vulnerability / Security / Public safety / National security


CHAPTER 1 What Is Security Engineering? Out of the crooked timber of humanity, no straight thing was ever made.
Add to Reading List

Document Date: 2011-12-05 05:22:27


Open Document

File Size: 290,03 KB

Share Result on Facebook

Country

United States / United Kingdom / Iraq / /

Currency

USD / /

IndustryTerm

software engineering / telephone service / value messaging systems / web-based electronic banking system / word processor / car door locks / spread-spectrum systems / secure systems / Internet turns / software tool / Patient record systems / encryption tools / security technology / communication systems / intelligence systems / remote systems / food logistics / economic infrastructure / command systems / machinery / Web-based technologies / security systems / media player / getaway car / healthcare / online radiology systems / similar technologies / poor auditor / Internet censorship / electronic authentication systems / car-jackings / food hygiene / internet security mechanisms / cryptographic challenge-response protocol / inventory management / improvised explosive devices / electricity / secure communications / computer security products / bank staff / electronic warfare systems / Bank websites / bank / longer travel / search engines / insurance premiums / privacy applications / control systems / alarm systems / healthcare accounts / security-critical computer systems / banking / bank systems / car alarms / early systems / cryptographic protocol / car keys / to intelligence systems / security protocols / /

Organization

Military Base Military / Icelandic Medical Association / national command authority / Airline Pilots Security Alliance / Chinese government / /

Person

Esther Dyson / Bob / Alice / Bruce Schneier / /

Position

businessman / teller / President / manager / major economic infrastructure / politician / poor auditor / civilian security engineer / officer / important technology driver / engineer / intelligence analyst / evaluator / word processor / programmer / /

Technology

cryptographic challenge-response protocol / X-ray / cryptographic protocol / mobile phones / security protocols / operating system / SSL / encryption / cryptography / Satellite TV / Authentication protocols / GSM / word processor / Bluetooth / a lot of interesting security technology / Web-based technologies / /

SocialTag