Автор: | Ross Anderson |
Издательство: | John Wiley & Sons Limited |
Серия: | |
Жанр произведения: | Зарубежная компьютерная литература |
Год издания: | 0 |
isbn: | 9781119642817 |
Summary
Research problems
Further reading
Notes
CHAPTER 16: Security Printing and Seals
16.1 Introduction
16.2 History
16.3 Security printing
16.4 Packaging and seals
16.5 Systemic vulnerabilities
16.6 Evaluation methodology
16.7 Summary
Research problems
Further reading
CHAPTER 17: Biometrics
17.1 Introduction
17.2 Handwritten signatures
17.3 Face recognition
17.4 Fingerprints
17.5 Iris codes
17.6 Voice recognition and morphing
17.7 Other systems
17.8 What goes wrong
17.9 Summary
Research problems
Further reading
Notes
CHAPTER 18: Tamper Resistance
18.1 Introduction
18.2 History
18.3 Hardware security modules
18.4 Evaluation
18.5 Smartcards and other security chips
18.6 The residual risk
18.7 So what should one protect?
18.8 Summary
Research problems
Further reading
Notes
CHAPTER 19: Side Channels
19.1 Introduction
19.2 Emission security
19.3 Passive attacks
19.4 Attacks between and within computers
19.5 Environmental side channels
19.6 Social side channels
19.7 Summary
Research problems
Further reading
CHAPTER 20: Advanced Cryptographic Engineering
20.1 Introduction
20.2 Full-disk encryption
20.3 Signal
20.4 Tor
20.5 HSMs
20.6 Enclaves
20.7 Blockchains
20.8 Crypto dreams that failed
20.9 Summary
Research problems
Further reading
Notes
CHAPTER 21: Network Attack and Defence
21.1 Introduction
21.2 Network protocols and service denial
21.3 The malware menagerie – Trojans, worms and RATs
21.4 Defense against network attack
21.5 Cryptography: the ragged boundary
21.6 CAs and PKI
21.7 Topology
21.8 Summary
Research problems
Further reading
Notes
CHAPTER 22: Phones
22.1 Introduction
22.2 Attacks on phone networks
22.3 Going mobile
22.4 Platform security
22.5 Summary
Research problems
Further reading
Notes
CHAPTER 23: Electronic and Information