Security Engineering: A Guide to Building Dependable Distributed Systems

Front Cover
John Wiley & Sons, Nov 5, 2010 - Computers - 1088 pages
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

What people are saying - Write a review

LibraryThing Review

User Review  - aethercowboy - LibraryThing

Wow! This is one of the most comprehensive books on security (particularly computer security) that I've ever read! Anderson takes the reader on a journey across all the different distributed systems ... Read full review

LibraryThing Review

User Review  - ittai - LibraryThing

This is an updating of Anderson's previous work, which was a standard for the field (it can be obtain in PDF for free on-line). I highly recommend it for those into security. The discipline and ... Read full review


Nuclear Command and Control
Security Printing and Seals
Physical Tamper Resistance
Emission Security
API Attacks
Electronic and Information Warfare
Telecom System Security

Distributed Systems
Part II
Multilateral Security
Banking and Bookkeeping
Physical Protection
Monitoring and Metering
Network Attack and Defense
Copyright and
The Bleeding Edge
Part III
System Evaluation and Assurance
End User License Agreement

Other editions - View all

Common terms and phrases

About the author (2010)

Ross Anderson is Professor of Security Engineering at Cambridge University and a pioneer of security economics. Widely recognized as one of the world's foremost authorities on security, he has published many studies of how real security systems fail and made trailblazing contributions to numerous technologies from peer-to-peer systems and API analysis through hardware security.

Bibliographic information