+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Security Engineering. A Guide to Building Dependable Distributed Systems. 2nd Edition

  • ID: 2251165
  • Book
  • April 2008
  • 1088 Pages
  • John Wiley and Sons Ltd
1 of 3
"Security engineering is different from any other kind of programming. . . . if you′re even thinking of doing any security engineering, you need to read this book."

Bruce Schneier

"This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work."
Gary McGraw

This book created the discipline of security engineering

The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice.

Here′s straight talk about

  • Technical engineering basics cryptography, protocols, access controls, and distributed systems
  • Types of attack phishing, Web exploits, card fraud, hardware hacks, and electronic warfare

  • Specialized protection mechanisms what biometrics, seals, smartcards, alarms, and DRM do, and how they fail

  • Security economics why companies build insecure systems, why it′s tough to manage security projects, and how to cope

  • Security psychology the privacy dilemma, what makes security too hard to use, and why deception will keep increasing

  • Policy why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it

Note: Product cover images may vary from those shown
2 of 3

Preface to the Second Edition xxv

Foreword by Bruce Schneier xxvii

Preface xxix

Acknowledgments xxxv

Part I

Chapter 1 What Is Security Engineering? 3

Chapter 2 Usability and Psychology 17

Chapter 3 Protocols 63

Chapter 4 Access Control 93

Chapter 5 Cryptography 129

Chapter 6 Distributed Systems 185

Chapter 7 Economics 215

Part II

Chapter 8 Multilevel Security 239

Chapter 9 Multilateral Security 275

Chapter 10 Banking and Bookkeeping 313

Chapter 11 Physical Protection 365

Chapter 12 Monitoring and Metering 389

Chapter 13 Nuclear Command and Control 415

Chapter 14 Security Printing and Seals 433

Chapter 15 Biometrics 457

Chapter 16 Physical Tamper Resistance 483

Chapter 17 Emission Security 523

Chapter 18 API Attacks 547

Chapter 19 Electronic and Information Warfare 559

Chapter 20 Telecom System Security 595

Chapter 21 Network Attack and Defense 633

Chapter 22 Copyright and DRM 679

Chapter 23 The Bleeding Edge 727

Part III

Chapter 24 Terror, Justice and Freedom 769

Chapter 25 Managing the Development of Secure Systems 815

Chapter 26 System Evaluation and Assurance 857

Chapter 27 Conclusions 889

Bibliography 893

Index 997

Note: Product cover images may vary from those shown
3 of 3


4 of 3
Ross J. Anderson
Note: Product cover images may vary from those shown