000 01075nam a2200217Ia 4500
005 20250730165044.0
008 250728s9999 xx 000 0 und d
020 _a978-0-12-3814141-2
082 _aC 005.8 M31s
100 _aMansourov, Nikolai
245 0 _aSystem assurance beyond detecting vulnerabilities
260 _aBurlington, MA
260 _b Mergan Kaufanaun
260 _c2011
300 _axix, 346 p. : ill
300 _bIncludes index
520 _aSystem assurance is a bit like detective work: Most of the time is spent out in the streets gathering evidence-interviewing potential witnesses or searching for a promising cigarette butt. Gathering evidence is important. The evidence contri-butes to understanding the situation (facts of the matter). Evidence drives the investigation (follow the facts). Remember, some detective time is spent on planning the investigative actions. Finally evidence is used to present the case in front of the judge and the jury.
650 _aComputer security
700 _aCampara, Djenana
942 _2ddc
_cBK
999 _c247
_d247