Security Engineering: A Guide to Building Dependable Distributed SystemsThe world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. |
From inside the book
Results 1-5 of 79
Page
... chapters or sections. Richard Bondi helped me refine the definitions in Chapter 1; Jianxin Yan, Alan Blackwell and Alasdair Grant helped me investigate the applied psychology aspects of passwords; John Gordon and Sergei Skorobogatov ...
... chapters or sections. Richard Bondi helped me refine the definitions in Chapter 1; Jianxin Yan, Alan Blackwell and Alasdair Grant helped me investigate the applied psychology aspects of passwords; John Gordon and Sergei Skorobogatov ...
Page
... chapter on banking systems; that chapter was also strengthened by input from Fay Hider and Willie List. The chapter on alarms contains much that I was taught by Roger Needham, Peter Dean, John Martin, Frank Clish, and Gary Geldart ...
... chapter on banking systems; that chapter was also strengthened by input from Fay Hider and Willie List. The chapter on alarms contains much that I was taught by Roger Needham, Peter Dean, John Martin, Frank Clish, and Gary Geldart ...
Page
... chapter on management benefited from input from Robert Brady, Jack Lang, and Willie List. Finally, mythinking on assurance has been influenced by many people, including Robin Ball, Robert Brady, Willie List, and Robert Morris. There ...
... chapter on management benefited from input from Robert Brady, Jack Lang, and Willie List. Finally, mythinking on assurance has been influenced by many people, including Robin Ball, Robert Brady, Willie List, and Robert Morris. There ...
Page
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Page
Sorry, this page's content is restricted.
Sorry, this page's content is restricted.
Contents
Legal Notice | |
Usability and Psychology | |
Protocols | |
Access Control | |
Crytography | |
Nuclear Command and Control | |
Security Printing and Seals | |
Biometrics | |
Physical Tamper Resistance | |
Emission Security | |
API Attacks | |
Electronic and Information Warfare | |
Telecom System Security | |
Distributed Systems | |
Economics | |
Part II | |
Multilateral Security | |
Banking and Bookkeeping | |
Physical Protection | |
Monitoring and Metering | |
Network Attack and Defense | |
Copyright and | |
The Bleeding Edge | |
Part III | |
System Evaluation and Assurance | |
Conclusions | |
End User License Agreement | |
Other editions - View all
Security Engineering: A Guide to Building Dependable Distributed Systems Ross J. Anderson Limited preview - 2008 |
Security Engineering: A Guide to Building Dependable Distributed Systems Ross J. Anderson No preview available - 2008 |
Common terms and phrases
access control account number alarm algorithm applications attacks authentication bank biometric block cipher botnet byte chapter chip ciphertext communications complex cost credit card crypto cryptography customers database decrypt detect developed devices digital signature discuss effect electronic encryption equipment example Figure fingerprint firewall fraud harder hardware hash function implemented industry input Internet issues keystream large number locks machine malware mandatory access control mechanisms meters Microsoft mobile phone multilevel secure operating system output packet password phishing phone companies plaintext problem processors protection protocol public key radar random records S-boxes seals secret security engineering security module security policy sensors serial number server signal smartcard staff standard stream cipher tachograph tamper tamper-resistant target techniques traffic transactions typically users vendors vulnerable