|
SECURITY ENGINEERING: A GUIDE TO BUILDING DEPENDABLE DISTRIBUTED SYSTEMS 2/E
|
|
沒有庫存 訂購需時10-14天
|
|
|
|
|
|
9780470068526 | |
|
|
|
ANDERSON | |
|
|
|
全華科技 | |
|
|
|
2009年1月01日
| |
|
|
|
550.00 元
| |
|
|
|
HK$ 522.5
|
|
|
|
|
| |
|
|
|
|
|
|
詳 細 資 料
|
* 叢書系列:實用資訊
* 規格:精裝 / 1080頁 / 普級 / 單色印刷 / 初版
* 出版地:台灣
實用資訊
|
|
分 類
|
專業/教科書/政府出版品 > 電機資訊類 > 資訊 |
同 類 書 推 薦
|
|
|
內 容 簡 介
|
quick reference guide to the do’s and don’ts of creating high quality security systems.Ross Anderson, widely recognized as one of the world’s foremost authorities on security engineering, presents a comprehensive design tutorial that covers a wide range of applications. Designed for today’s programmers who need to build systems that withstand malice as well as error (but have no time to go do a PhD in security), this book illustrates basic concepts through many real-world system design successes and failures. Topics range from firewalls, through phone phreaking and copyright protection, to frauds against e-businesses. Anderson’s book shows how to use a wide range of tools, from cryptology through smartcards to applied psychology. As everything from burglar alarms through heart monitors to bus ticket dispensers starts talking IP, the techniques taught in this book will become vital to everyone who wants to build systems that are secure, dependable and manageable.
本書特色
1 . Revision of best-selling first editon.
2 . Updated wiht 200 more pages and new coverage of VIsta, Xen, phishing, ”Google” issues, declassified military doctrine, ”Richard Clarke issues”, Skype, mobile fraud, music security issues(iTunes, etc.), antitrust issues and more.
3 . No other book covers the security of
embedded applications(cars, postal meters, vending machines, phones, etc.)
4 . The author is one of the world’’s foremost authorities onforemost authorities onf security design for companies like Microsoft, Intel, and VISA; the first edition is considered the seminal work in security desing.
|
|
目 錄
|
1. What is security engineering?
2. Usability and Psychology.
3. Protocols.
4. Access Control.
5 Cryptography.
6. Distributed Systems.
7. Economics.
8. Multilevel Security.
9. Multilateral Security.
10. Banking and Bookkeeping.
11. Physical Protection.
12. Monitoring and Metering.
13. Nuclear Command and Control.
14. Security Printing and Seals.
15. Biometrics.
16. Physical Tamper Resistance.
17. Emission Security.
18. API Attacks.
19. Electronic and Information Warfare.
20. Telecom System Security.
21. Network Attack and Defense.
22. Copyright and DRM.
23. The Bleeding Edge.
24. Terror, Justice and Freedom.
25. Managing the Development of Secure Systems.
27. Conclusions.
|
|
|
書 評
|
|
|
|