Security Engineering: A Guide to Building Dependable Distributed Systems

Front Cover
John Wiley & Sons, Apr 14, 2008 - Computers - 1088 pages
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
 

Contents

What Is Security Engineering?
3
Chapter
6
Usability and Psychology
17
Protocols
63
Access Control
93
Cryptography
129
Distributed Systems
185
Research Problems
212
Nonstop
539
Summary
546
API Attacks
547
Electronic and Information Warfare
559
Telecom System Security
595
Network Attack and Defense
633
Intrusion Detection
660
Topology
675

Economics
215
Part II
237
Multilevel Security
239
Blacker
253
Broader Implications of MLS
269
Multilateral Security
275
Banking and Bookkeeping
313
What Goes Wrong
331
Physical Protection
365
Monitoring and Metering
389
Nuclear Command and Control
415
Security Printing and Seals
433
Biometrics
457
Physical Tamper Resistance
483
Emission Security
523
Copyright and DRM
679
The Bleeding Edge
722
The Bleeding Edge
727
Computer Games
728
Part III
729
Web Applications
734
Elections
759
Further Reading
765
Terror Justice and Freedom
769
Managing the Development of Secure Systems
815
System Evaluation and Assurance
857
Conclusions
889
Bibliography
893
Index
997
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Ross Anderson is Professor of Security Engineering at Cambridge University and a pioneer of security economics. Widely recognized as one of the world's foremost authorities on security, he has published many studies of how real security systems fail and made trailblazing contributions to numerous technologies from peer-to-peer systems and API analysis through hardware security.

Bibliographic information