Security Engineering: A Guide to Building Dependable Distributed Systems

Front Cover
John Wiley & Sons, Apr 14, 2008 - Computers - 1088 pages
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
 

Contents

Biometrics
457
Physical Tamper Resistance
483
What Goes Wrong
514
Emission Security
523
Active Attacks
538
API Attacks
547
Electronic and Information Warfare
559
Telecom System Security
595

Access Control
93
What Goes Wrong
117
Cryptography
129
Modes of Operation
160
Distributed Systems
185
Naming
200
Economics
215
Part II
237
Future MLS Systems
257
Multilateral Security
275
Inference Control
293
Banking and Bookkeeping
313
Credit Cards
343
Physical Protection
365
Alarms
378
Monitoring and Metering
389
Nuclear Command and Control
415
Security Printing and Seals
433
Packaging and Seals
443
Network Attack and Defense
633
Copyright and DRM
679
General Platforms
704
Information Hiding
710
The Bleeding Edge
727
Web Applications
734
Privacy Technology
745
Part III
767
Terror Justice and Freedom
769
Censorship
797
Managing the Development of Secure Systems
815
System Evaluation and Assurance
857
Evaluation
869
Ways Forward
881
Conclusions
889
Bibliography
893
Index
997
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Ross Anderson is Professor of Security Engineering at Cambridge University and a pioneer of security economics. Widely recognized as one of the world's foremost authorities on security, he has published many studies of how real security systems fail and made trailblazing contributions to numerous technologies from peer-to-peer systems and API analysis through hardware security.

Bibliographic information