Security Engineering: A Guide to Building Dependable Distributed Systems
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Research Problems Further Reading Chapter 6 Distributed Systems
Insights from Psychology Research
The Residual Problem
FingerprintsIrisCodes Voice Recognition
access control alarm algorithm andthe applications asthe attacks authentication bank biometric block cipher botnet bugs bythe canbe chapter chip ciphertext communications complex computer security credit card crypto cryptography customers database decrypt defined detection developed devices digital signature discuss electronic encryption equipment evaluation example fingerprint fraud fromthe function hardware hash hash function implementation industry intelligence Internet inthe issues keystream large number machine malware mandatory access control mechanisms meters Microsoft mobile phone multilevel security ofthe onthe operating system password phishing phone companies plaintext problem processors protection protocol public key random records risk security engineering security policy server signal signature smartcard standard suchas tachographs tamper tamper resistance tamperresistant target technical techniques thatthe there's tobe tothe traffic transactions Unix users vendors vulnerabilities wiretapping