Sale!

Security Engineering: A Guide to Building Dependable Distributed Systems

4,053.00

A Guide to Building Dependable Distributed Systems

This book is currently not in stock. You are pre-ordering this book.

ISBN: 9781119642787 Category:

<p><b>Now that there’s software in everything, how can you make anything</b><b> secure? Understand how to engineer dependable systems with this newly updated classic </b> </p> <p>In <i>Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition </i>Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.  </p> <p>This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability.  </p> <p>Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: </p> <ul style=”margin-bottom: 0in; font-size: medium; margin-top: 0in; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;” type=”disc”> <li style=”margin: 0in 0in 0.0001pt 0.25in; font-size: 11pt; font-family: Calibri, sans-serif; vertical-align: baseline; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;”>How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things </li> <li style=”margin: 0in 0in 0.0001pt 0.25in; font-size: 11pt; font-family: Calibri, sans-serif; vertical-align: baseline; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;”>Who the attackers are – from nation states and business competitors through criminal gangs to stalkers and playground bullies </li> <li style=”margin: 0in 0in 0.0001pt 0.25in; font-size: 11pt; font-family: Calibri, sans-serif; vertical-align: baseline; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;”>What they do – from phishing and carding through SIM swapping and software exploits to DDoS and fake news</li> <li style=”margin: 0in 0in 0.0001pt 0.25in; font-size: 11pt; font-family: Calibri, sans-serif; vertical-align: baseline; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;”>Security psychology, from privacy through ease-of-use to deception  </li> <li style=”margin: 0in 0in 0.0001pt 0.25in; font-size: 11pt; font-family: Calibri, sans-serif; vertical-align: baseline; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;”>The economics of security and dependability – why companies build vulnerable systems and governments look the other way </li> <li style=”margin: 0in 0in 0.0001pt 0.25in; font-size: 11pt; font-family: Calibri, sans-serif; vertical-align: baseline; user-select: text; -webkit-user-drag: none; -webkit-tap-highlight-color: transparent; cursor: text; overflow: visible;”>How dozens of industries went online – well or badly</li> <l