Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson, Ross Anderson
Publisher: Wiley 2001
ISBN/ASIN: 0470068523
Number of pages: 640
Description:
In more than 600 pages of intense information, Anderson lays the groundwork on how to build a secure and dependable system. Every aspect of information security is discussed in the book -- from passwords, access control, and attacks, to physical security and policy. Additionally, relevant and timely topics such as information warfare, privacy protection, access control, and more are discussed. This is the only book that covers the end-to-end spectrum of security design and engineering.
Download or read it online for free here:
Download link
(16MB, PDF)
Similar books
The Security Development Lifecycleby Michael Howard, Steve Lipner - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(9344 views)
Handbook of Information Security Managementby Micki Krause, Harold F. Tipton - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(15928 views)
Cyber Infrastructure Protectionby Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(13335 views)
What If Crime Were Impossible?by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(11283 views)