Foundations of Security
- Chapter 15 - MACs and Signatures.pdf367.9 KB
- Chapter 09 - Password Security.pdf275.15 KB
- Chapter 10 - Cross-Domain Security in Web Applications.pdf269.97 KB
- Chapter 02 - Secure Systems Design.pdf240.87 KB
- Chapter 08 - SQL Injection.pdf206.03 KB
- back-matter.pdf202.21 KB
- Chapter 07 - Client-State Manipulation.pdf190.78 KB
- Chapter 06 - Buffer Overflows.pdf165.93 KB
- Chapter 12 - Symmetric Key Cryptography.pdf164.25 KB
- Chapter 01 - Security Goals.pdf163.89 KB
- Chapter 13 - Asymmetric Key Cryptography.pdf153.84 KB
- Chapter 14 - Key Management and Exchange.pdf153.32 KB
- front-matter.pdf141.31 KB
- Chapter 03 - Secure Design Principles.pdf136.09 KB
- cover-large.gif120.25 KB
- Chapter 05 - Worms and Other Malware.pdf119.65 KB
- Chapter 11 - Exercises for Part 2.pdf66.19 KB
- Chapter 16 - Exercises for Part 3.pdf58.72 KB
- Chapter 04 - Exercises for Part 1.pdf53.88 KB
- springer_url.txt40 Bytes