free tracker
Categories Unlimited Books

Security Engineering: A Guide to Building Dependable Distributed Systems



“Security engineering is different from any other kind of programming… if you’re even thinking of doing any security engineering, you need to read this book. ” — Bruce Schneier “This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work.New
Mint Condition
Dispatch same day for order received before 12 noon
Guaranteed packaging
No quibbles returns


Security Engineering

Pub Date : 2010-11-05 | Author : Ross J. Anderson | Publisher : John Wiley & Sons

ISBN 10 : 9781118008362
ISBN 13 : 1118008367

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with e..


Building Dependable Distributed Systems

Pub Date : 2014-03-06 | Author : Wenbing Zhao | Publisher : John Wiley & Sons

ISBN 10 : 9781118912638
ISBN 13 : 1118912632

This book covers the most essential techniques for designing and building dependable distributed systems. Instead of covering a broad range of research works for each dependability..


Cryptography Engineering

Pub Date : 2011-02-02 | Author : Niels Ferguson | Publisher : John Wiley & Sons

ISBN 10 : 9781118080917
ISBN 13 : 1118080912

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formu..


Threat Modeling

Pub Date : 2014-02-12 | Author : Adam Shostack | Publisher : John Wiley & Sons

ISBN 10 : 9781118810057
ISBN 13 : 1118810058

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security d..


Enterprise Security Architecture

Pub Date : 2015-09-15 | Author : Nicholas A Sherwood | Publisher : CRC Press

ISBN 10 : 9781498759908
ISBN 13 : 1498759904

Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having ..


Introduction To Hardware Security And Trust

Pub Date : 2011-09-22 | Author : Mohammad Tehranipoor | Publisher : Springer Science & Business Media

ISBN 10 : 1441980806
ISBN 13 : 9781441980809

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes sec..


Intrusion Detection

Pub Date : 2000-01 | Author : Rebecca Gurley Bace | Publisher : Sams Publishing

ISBN 10 : 1578701856
ISBN 13 : 9781578701858

With the number of intrusion and hacking incidents around the world on the rise, the importance of having dependable intrusion detection systems in place is greater than ever. Offe..


Leave a Reply

Your email address will not be published. Required fields are marked *