• Security Engineering: A Guide to Building Dependable Distributed Systems See large image

    Security Engineering: A Guide to Building Dependable Distributed Systems (Hardback) By (author) Ross J. Anderson

    $63.20 - Save $25.61 28% off - RRP $88.81 Free delivery worldwide Available
    Dispatched in 4 business days
    When will my order arrive?
    Add to basket | Add to wishlist |

    DescriptionThe world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.


Other books

Other people who viewed this bought | Other books in this category
Showing items 1 to 10 of 10

 

Reviews | Bibliographic data
  • Full bibliographic data for Security Engineering

    Title
    Security Engineering
    Subtitle
    A Guide to Building Dependable Distributed Systems
    Authors and contributors
    By (author) Ross J. Anderson
    Physical properties
    Format: Hardback
    Number of pages: 1080
    Width: 196 mm
    Height: 239 mm
    Thickness: 66 mm
    Weight: 1,724 g
    Language
    English
    ISBN
    ISBN 13: 9780470068526
    ISBN 10: 0470068523
    Classifications

    BIC E4L: COM
    Nielsen BookScan Product Class 3: S10.2
    B&T Book Type: NF
    B&T Modifier: Region of Publication: 01
    B&T Modifier: Subject Development: 20
    B&T Modifier: Academic Level: 03
    B&T Merchandise Category: STX
    B&T General Subject: 229
    B&T Modifier: Text Format: 01
    DC22: 005.1
    B&T Approval Code: A93603600
    Warengruppen-Systematik des deutschen Buchhandels: 16310
    BIC subject category V2: UTN, URY
    B&T Approval Code: A93663050
    BISAC V2.8: COM053000
    DC22: 005.8
    LC subject heading: ,
    BISAC V2.8: COM051300, COM043040
    Ingram Subject Code: XY
    Libri: I-XY
    LC subject heading:
    B&T Approval Code: A93600800
    LC subject heading:
    LC classification: QA76.9.A25 A54 2008
    DC22: 576.119296
    Thema V1.0: UTN, URY
    Edition
    2, Revised
    Edition statement
    2nd Revised edition
    Publisher
    John Wiley and Sons Ltd
    Imprint name
    John Wiley & Sons Ltd
    Publication date
    14 April 2008
    Publication City/Country
    Chichester
    Author Information
    Ross Anderson is Professor of Security Engineering at Cambridge University and a pioneer of security economics. Widely recognized as one of the world's foremost authorities on security, he has published many studies of how real security systems fail and made trailblazing contributions to numerous technologies from peer-to-peer systems and API analysis through hardware security.
    Review quote
    "At over a thousand pages, this is a comprehensive volume." Engineering & Technology Saturday 7 June 2008
    Back cover copy
    "Security engineering is different from any other kind of programming. . . . if you're even thinking of doing any security engineering, you need to read this book." -- Bruce Schneier"This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work." -- Gary McGrawThis book created the discipline of security engineeringThe world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy -- and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice.Here's straight talk aboutTechnical engineering basics -- cryptography, protocols, access controls, and distributed systemsTypes of attack -- phishing, Web exploits, card fraud, hardware hacks, and electronic warfareSpecialized protection mechanisms -- what biometrics, seals, smartcards, alarms, and DRM do, and how they failSecurity economics -- why companies build insecure systems, why it's tough to manage security projects, and how to copeSecurity psychology -- the privacy dilemma, what makes security too hard to use, and why deception will keep increasingPolicy -- why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it
    Table of contents
    Preface to the Second Edition. Foreword by Bruce Schneier. Preface. Acknowledgments. Part I. Chapter 1 What Is Security Engineering? Chapter 2 Usability and Psychology. Chapter 3 Protocols. Chapter 4 Access Control. Chapter 5 Cryptography. Chapter 6 Distributed Systems. Chapter 7 Economics. Part II. Chapter 8 Multilevel Security. Chapter 9 Multilateral Security. Chapter 10 Banking and Bookkeeping. Chapter 11 Physical Protection. Chapter 12 Monitoring and Metering. Chapter 13 Nuclear Command and Control. Chapter 14 Security Printing and Seals. Chapter 15 Biometrics. Chapter 16 Physical Tamper Resistance. Chapter 17 Emission Security. Chapter 18 API Attacks. Chapter 19 Electronic and Information Warfare. Chapter 20 Telecom System Security. Chapter 21 Network Attack and Defense. Chapter 22 Copyright and DRM. Chapter 23 The Bleeding Edge. Part III. Chapter 24 Terror, Justice and Freedom. Chapter 25 Managing the Development of Secure Systems. Chapter 26 System Evaluation and Assurance. Chapter 27 Conclusions. Bibliography. Index.