| 000 | 01075nam a2200217Ia 4500 | ||
|---|---|---|---|
| 005 | 20250730165044.0 | ||
| 008 | 250728s9999 xx 000 0 und d | ||
| 020 | _a978-0-12-3814141-2 | ||
| 082 | _aC 005.8 M31s | ||
| 100 | _aMansourov, Nikolai | ||
| 245 | 0 | _aSystem assurance beyond detecting vulnerabilities | |
| 260 | _aBurlington, MA | ||
| 260 | _b Mergan Kaufanaun | ||
| 260 | _c2011 | ||
| 300 | _axix, 346 p. : ill | ||
| 300 | _bIncludes index | ||
| 520 | _aSystem assurance is a bit like detective work: Most of the time is spent out in the streets gathering evidence-interviewing potential witnesses or searching for a promising cigarette butt. Gathering evidence is important. The evidence contri-butes to understanding the situation (facts of the matter). Evidence drives the investigation (follow the facts). Remember, some detective time is spent on planning the investigative actions. Finally evidence is used to present the case in front of the judge and the jury. | ||
| 650 | _aComputer security | ||
| 700 | _aCampara, Djenana | ||
| 942 |
_2ddc _cBK |
||
| 999 |
_c247 _d247 |
||