Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.
Questions About This Book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
Table of Contents
Chapter 1 – Decomposition, from system to software
Chapter 2 – Certifiable system
Chapter 3 – Risk and security level
Chapter 4 – Securization principles of a hardware architecture
Chapter 5 – Principles of software securization
Chapter 6 – Certification