A Guide to Building Dependable Distributed Systems
Book Details:
Publisher: | Wiley |
Series: |
Wiley
|
Author: | Ross Anderson |
Edition: | 2 |
ISBN-10: | 0470068523 |
ISBN-13: | 9780470068526 |
Pages: | 1080 |
Published: | Apr 14 2008 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 5.88 MB |
Book Description:
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
A Guide for Project Managers
'This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the development lifecycle.' -Steve Riley, senior security strategist, Microsoft Corporation 'There are books written on some of the topics addressed in this book, and there are other books on secure systems engineering. Few address the entire life cycle with a comprehensive overview and discussion of emerging trends and topics as well as this one.' -Ronda Henning, senior scientist-software/security queen, Harris Corporation Software that is developed fro...
A Practical Approach for Systems and Software Assurance
Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security throughout your full system development and acquisition lifecycles.Drawing on their pioneering work at the Software Engineering Institute (SEI) and Carnegie Mellon University, Mead and Woody introduce seven core principles of software assurance, and show how to apply them coherently and systematically. Using these principles, they help you prioritize the wide range of pos...
Integrating Security and Systems Engineering
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers.Security Patternsaddresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process. Essential for designers building large-scale systems who want best practice solutions to typical security problemsReal world case studies illustrate how to use the patterns in specific domainsFor more information visit www.securitypatterns.org...
2007 - 2021 © eBooks-IT.org