000 01608nam a2200301zi 4500
005 20220228105237.0
008 080325s2007 xxua 000 0 eng d
020 _a1590597842 (rústica)
020 _a9781590597842 (rústica)
035 _aMX001001137830
040 _aBIB
_bspa
_cBIB
_dBIB
_dYDXCP
_dBAKER
_dIUL
_dDAY
_dBTCTA
_dSOI
_dUNAMX
050 4 _aQA76.76P76
_bD37
100 1 _aDaswani, Neil,
_eautor
245 1 0 _aFoundations of security :
_bwhat every programmer needs to know /
_cNeil Daswani, Christoph Kern, and Anita Kesavan
264 1 _aBerkeley, California :
_bApress,
_cc2007
300 _axxvii, 290 páginas :
_bilustraciones
490 0 _aThe Expert's voice in security
505 0 _aContenido: Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulation -- SQL injection -- Password security -- Cross-domain security in web applications -- Exercises for part 2 -- Pt. 3. Introduction to cryptography -- Symmetric key crytography -- Asymmetric key cryptography -- Key management and exchange -- MACs and signatures -- Exercises for part 3
650 4 _aProtección del software
650 4 _aSeguridad informática
650 4 _aEncriptamiento de datos (Computación)
700 1 _aKern, Christoph,
_d1975- ,
_eautor
700 1 _aKesavan, Anita,
_eautor
336 _atexto
_2rdacontent
337 _asin medio
_2rdamedia
338 _avolumen
_2rdacarrier
999 _c34391
_d34391