My cart
Your shopping cart is empty.
Preface xi
Introduction xv
1 Spoofing and Authenticity 1
2 Tampering and Integrity 41
3 Repudiation and Proof 63
4 Information Disclosure and Confidentiality 95
5 Denial of Service and Availability 131
6 Expansion of Authority and Isolation 151
7 Predictability and Randomness 187
8 Parsing and Corruption 211
9 Kill Chains 249...
Preface xi
Introduction xv
1 Spoofing and Authenticity 1
2 Tampering and Integrity 41
3 Repudiation and Proof 63
4 Information Disclosure and Confidentiality 95
5 Denial of Service and Availability 131
6 Expansion of Authority and Isolation 151
7 Predictability and Randomness 187
8 Parsing and Corruption 211
9 Kill Chains 249...