Back to Results
First PageMeta Content
Public safety / Computer network security / Cryptography / Computer security / Information security / Security engineering / Computer literacy / Bruce Schneier / Operating system / Security / Crime prevention / National security


Preface to the Second Edition The first edition of Security Engineering was published in MaySince then the world has changed. System security was one of Microsoft’s lowest priorities then; it’s now one of the
Add to Reading List

Document Date: 2008-04-27 09:37:07


Open Document

File Size: 139,29 KB

Share Result on Facebook

Company

Google / Facebook / Needham / Microsoft / /

Continent

Europe / Americas / /

Country

United States / /

Facility

Cambridge University / /

IndustryTerm

appropriate technology / software design / electronic device / electricity meters / Pervasive computing / disputed Internet credit card transactions / online lifestyles / security protocol / bank cash machines / identify-friend-or-foe equipment / security technology / Medical record systems / crypto and operating systems / fundamental technologies / online applications / everyday systems / security printing / real systems / bank accounts / software reliability / software applications / important applications / Internet security / Passenger ticket systems / electronic healthcare / socio-technical systems / even prepayment gas meters / /

OperatingSystem

XP / Windows NT / Microsoft Vista / /

Organization

Cambridge University / /

Person

Ross Anderson / Ross Anderson Cambridge / Roger Needham / John W. Campbell / Bruce Schneier January / /

Position

security engineer / great science fiction editor / detective / minority player / consultant / Preface programmer / mathematician / engineer / security designer / vending machine operator / computer science professor / established professional security manager / working police detective / chemist / late great science fiction editor / /

Product

Atlantic / /

Region

mid-Atlantic / /

Technology

fundamental technologies / appropriate technology / mobile phones / underlying technologies / operating system / operating systems / Encryption / cellular telephone / Cryptography / security protocol / satellite TV / security technology / GSM / /

SocialTag