Security Engineering: A Guide to Building Dependable Distributed SystemsThe world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. |
Contents
3 | |
6 | |
17 | |
63 | |
93 | |
Cryptography | 129 |
Distributed Systems | 185 |
Research Problems | 212 |
Nonstop | 539 |
Summary | 546 |
API Attacks | 547 |
Electronic and Information Warfare | 559 |
Telecom System Security | 595 |
Network Attack and Defense | 633 |
Intrusion Detection | 660 |
Topology | 675 |
Economics | 215 |
Part II | 237 |
Multilevel Security | 239 |
Blacker | 253 |
Broader Implications of MLS | 269 |
Multilateral Security | 275 |
Banking and Bookkeeping | 313 |
What Goes Wrong | 331 |
Physical Protection | 365 |
Monitoring and Metering | 389 |
Nuclear Command and Control | 415 |
Security Printing and Seals | 433 |
Biometrics | 457 |
Physical Tamper Resistance | 483 |
Emission Security | 523 |
Copyright and DRM | 679 |
The Bleeding Edge | 722 |
The Bleeding Edge | 727 |
Computer Games | 728 |
Part III | 729 |
Web Applications | 734 |
Elections | 759 |
Further Reading | 765 |
Terror Justice and Freedom | 769 |
Managing the Development of Secure Systems | 815 |
System Evaluation and Assurance | 857 |
Conclusions | 889 |
Bibliography | 893 |
Index | 997 |
Other editions - View all
Security Engineering: A Guide to Building Dependable Distributed Systems Ross J. Anderson Limited preview - 2010 |
Security Engineering: A Guide to Building Dependable Distributed Systems Ross J. Anderson No preview available - 2008 |
Common terms and phrases
access control alarm algorithm applications attacks authentication bank block cipher botnet bugs Chapter chip ciphertext communications complex computer security cost countries credit card crypto cryptography customers database decrypt detect developed devices digital signature discuss electronic encryption equipment evaluation example fingerprint fraud function harder hardware hash implementation industry input Internet ISBN issues keystream large number machine malware mandatory access control mechanisms meters Microsoft mobile phone multilevel security operating system password phishing phone companies plaintext problem processors protection protocol public key random records risk S-box secret security engineering security policy serial number server signal signature smartcard staff standard stream cipher tachograph tamper tamper-resistant target technical techniques there’s things threat traffic transactions typically users vendors vulnerabilities wiretapping