Skip to content

Security Engineering A Guide to Building Dependable Distributed Systems

Best in textbook rentals since 2012!

ISBN-10: 0470068523

ISBN-13: 9780470068526

Edition: 2nd 2008

Authors: Ross J. Anderson

List price: $80.00
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The book is a security design manual for embedded systems, the only one of its kind, thought to be a seminal work and controversial in high-level circles because because of the powerful algorithms presented within. The author gets right to providing the crucial dos and donts of creating high quality security software that works to prevent all manner of security breaches. The revisions and updates include more than 200 new pages on Vista, Xen, phishing, Google issues, declassified military doctrine, "Richard Clarke issues," Skype, mobile fraud, music security issues, antitrust issues, and more.
Customers also bought

Book details

List price: $80.00
Edition: 2nd
Copyright year: 2008
Publisher: John Wiley & Sons, Incorporated
Publication date: 4/14/2008
Binding: Hardcover
Pages: 1080
Size: 7.75" wide x 9.25" long x 2.50" tall
Weight: 3.784
Language: English

Ross Anderson is Professor of Security Engineering at Cambridge University and a pioneer of security economics. Widely recognized as one of the world's foremost authorities on security, he has published many studies of how real security systems fail and made trailblazing contributions to numerous technologies from peer-to-peer systems and API analysis through hardware security.

What Is Security Engineering?
Usability and Psychology
Protocols
Access Control
Cryptography
Distributed Systems
Economics
Multilevel Security
Multilateral Security
Banking and Bookkeeping
Physical Protection
Monitoring and Metering
Nuclear Command and Control
Security Printing and Seals
Biometrics
Physical Tamper Resistance
Emission Security
API Attacks
Electronic and Information Warfare
Telecom System Security
Network Attack and Defense
Copyright and DRM
The Bleeding Edge
Terror, Justice and Freedom
Managing the Development of Secure Systems
System Evaluation and Assurance
Conclusions
Bibliography
Index