Die erste Kurzanleitung für die Erstellung hochwertiger Sicherheitssysteme. Ross Anderson, weit anerkannt als eine der weltweit führenden Behörden für Sicherheitstechnik, präsentiert ein umfassendes Design-Tutorial, das eine Vielzahl von Anwendungen abdeckt. Entwickelt für die heutigen Programmierer, die Systeme bauen müssen, die Fehlschlag sowie Fehler standhalten müssen (aber keine Zeit haben, einen Doktor in Sicherheit zu machen), veranschaulicht dieses Buch grundlegende Konzepte durch viele reale Systemdesign-Erfolge und Misserfolge. Die Themen reichen von Firewalls über Telefonphreaking und Urheberrechtsschutz bis hin zu Betrug gegen E-Unternehmen. Das Buch von Anderson zeigt, wie man eine Vielzahl von Werkzeugen nutzt, von Kryptologie über Smartcards bis hin zur angewandten Psychologie. Da alles von Einbruchalarmen über Herzmonitoren bis hin zu Busticket-Spendern beginnt, die Techniken in diesem Buch zu sprechen, werden für jeden entscheidend, der Systeme bauen möchte, die sicher, zuverlässig und überschaubar sind.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
ROSS ANDERSON teaches and directs research in computer security at Cambridge University, England. Widely recognized as one of the world's foremost authorities on security engineering, he has published extensive studies on how real security systems fail on bank card fraud, phone phreaking, pay--TV hacking, ways to cheat metering systems and breaches of medical privacy.
"If you′re even thinking of doing any security engineering, you need to read this book. It′s the first, and only, end–to–end modern security design and engineering book ever written."–Bruce Schneier
"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson, "as if that′s all there is when in reality security problems have just begun. By 2003, there may be more mobile phones on the Net than PCs, and they will be quickly followed by network–connected devices from refrigerators to burglar alarms to heart monitors. How will we manage the risks?"
Dense with anecdotes and war stories, readable, up–to–date and full of pointers to recent research, this book will be invaluable to you if you have to design systems to be resilient in the face of malice as well as error. Anderson provides the tools and techniques you′ll need, discusses what′s gone wrong in the past, and shows you how to get your design right the first time around.
You don′t need to be a security expert to understand Anderson′s truly accessible discussion of:
∗ Security engineering basics, from protocols, cryptography, and access controls to the nuts and bolts of distributed systems
∗ The lowdown on biometrics, tamper resistance, security seals, copyright marking, and many other protection technologies–for many of them, this is the first detailed information in an accessible textbook
∗ What sort of attacks are done on a wide range of systems–from banking and medical records through burglar alarms and smart cards to mobile phones and e–commerce–and how to stop them
∗ Management and policy issues–how computer security interacts with the law and with corporate culture
`Many people are anxious about Internet security', says leading expert Ross Anderson, `and that's with just PCs and servers attached. But over the next few years a huge range of devices is going to come online. By 2003 there may well be more mobile phones on the net than PCs, and they will be followed by everything from fridges through burglar alarms to heart monitors. How will we manage the risks?'
Dense with anecdotes and war stories, readable, up to date and full of pointers to recent research, this book will be invaluable to you if you have to design systems to be resilient in the face of malice as well as error. Anderson provides the tools and techniques you'll need, discusses what's gone wrong in the past, and shows you how to get your design right the first time around.
You don't need to be a security expert to understand Anderson's truly accessible discussion of:
* Security engineering basics, from protocols, cryptography and access controls to the nuts and bolts of distributed systems
* The lowdown on biometrics, tamper resistance, security seals, copyright marking and many other protection technologies - for many of them, this is the first detailed information in an accessible textbook
* What sort of attacks are done on a wide range of systems, from banking and medical records through buglar alarms and smartcards to mobile phones and e-commerce - and how to stop them
* Management and policy issues - how computer security interacts with the law and with corporate culture
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Artikel-Nr. 3979812-6
Anzahl: 1 verfügbar
Anbieter: Better World Books: West, Reno, NV, USA
Zustand: Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Artikel-Nr. GRP9359687
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Reno, Reno, NV, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471389226I3N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471389226I3N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471389226I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471389226I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471389226I3N00
Anzahl: 1 verfügbar
Anbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Good. 1. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Artikel-Nr. 0471389226-11-1
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Artikel-Nr. GOR001547777
Anzahl: 7 verfügbar
Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
Paperback. Zustand: Very Good. Security Engineering: A Guide to Building Dependable Distributed Systems This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Artikel-Nr. 7719-9780471389224
Anzahl: 2 verfügbar