Security Engineering: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 13: Line 13:
==Key Words==  
==Key Words==  


cryptography, protocols, access controls, distributed systems, phishing, web exploits, card fraud, hardware hacks, electronic warfare, protection mechanisms, biometrics, seals, smartcards, alarms, DRM, economics, insecure systems, management of security projects, psychology, privacy, deception, policy, vulnerabilities, terrorism  
cryptography, encryption, protocols, access controls, distributed systems, phishing, web exploits, card fraud, hardware hacks, electronic warfare, protection mechanisms, biometrics, seals, smartcards, alarms, DRM, economics, insecure systems, management of security projects, psychology, privacy, deception, policy, vulnerabilities, terrorism  


==Synopsis==
==Synopsis==


The book is a security design manual for embedded systems, the only one of its kind, thought to be a seminal work and controversial in high-level circles because because of the powerful algorithms presented within. The author gets right to providing the crucial do's and don'ts of creating high quality security software that works to prevent all manner of security breaches. The revisions and updates include more than 200 new pages on Vista, Xen, phishing, Google issues, declassified military doctrine, "Richard Clarke issues," Skype, mobile fraud, music security issues, antitrust issues, and more.   
This book is a security design manual for embedded systems. The author provides the crucial do's and don'ts of creating high quality security software that works to prevent all manner of security breaches. The revisions and updates include more than 200 new pages on Vista, Xen, phishing, Google issues, declassified military doctrine, "Richard Clarke issues," Skype, mobile fraud, music security issues, antitrust issues, and more.   


==Additional Notes and Highlights==
==Additional Notes and Highlights==

Revision as of 10:24, 4 June 2010

Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition

Full Citation

Ross J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition (2008)

BibTeX

Categorization

Issues: Books

Key Words

cryptography, encryption, protocols, access controls, distributed systems, phishing, web exploits, card fraud, hardware hacks, electronic warfare, protection mechanisms, biometrics, seals, smartcards, alarms, DRM, economics, insecure systems, management of security projects, psychology, privacy, deception, policy, vulnerabilities, terrorism

Synopsis

This book is a security design manual for embedded systems. The author provides the crucial do's and don'ts of creating high quality security software that works to prevent all manner of security breaches. The revisions and updates include more than 200 new pages on Vista, Xen, phishing, Google issues, declassified military doctrine, "Richard Clarke issues," Skype, mobile fraud, music security issues, antitrust issues, and more.

Additional Notes and Highlights

Table of Contents
  Preface to the Second Edition.
  Foreword by Bruce Schneier.
  Preface.
  Acknowledgments.
  Part I.
    Chapter 1 What Is Security Engineering?
    Chapter 2 Usability and Psychology.
    Chapter 3 Protocols.
    Chapter 4 Access Control.
    Chapter 5 Cryptography.
    Chapter 6 Distributed Systems.
    Chapter 7 Economics.
  Part II.
    Chapter 8 Multilevel Security.
    Chapter 9 Multilateral Security.
    Chapter 10 Banking and Bookkeeping.
    Chapter 11 Physical Protection.
    Chapter 12 Monitoring and Metering.
    Chapter 13 Nuclear Command and Control.
    Chapter 14 Security Printing and Seals.
    Chapter 15 Biometrics.
    Chapter 16 Physical Tamper Resistance.
    Chapter 17 Emission Security.
    Chapter 18 API Attacks.
    Chapter 19 Electronic and Information Warfare.
    Chapter 20 Telecom System Security.
    Chapter 21 Network Attack and Defense.
    Chapter 22 Copyright and DRM.
    Chapter 23 The Bleeding Edge.
  Part III.
    Chapter 24 Terror, Justice and Freedom.
    Chapter 25 Managing the Development of Secure Systems.
    Chapter 26 System Evaluation and Assurance.
    Chapter 27 Conclusions.
  Bibliography.
  Index.


Single PDF of the First Edition