Fai clic su di un'immagine per andare a Google Ricerca Libri.
Sto caricando le informazioni... Security Engineering: A Guide to Building Dependable Distributed Systemsdi Ross J. Anderson
Nessuno Sto caricando le informazioni...
Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro. Attualmente non vi sono conversazioni su questo libro. Wow! This is one of the most comprehensive books on security (particularly computer security) that I've ever read! Anderson takes the reader on a journey across all the different distributed systems we now take for granted, and explains in very clear language, how each and every single on is flawed, and in some cases, even shows the flaws. While this is a pretty thick tome, it's right up the alley of anybody who enjoys reading up on computer security, or even good security practices in general. Highly recommended for security enthusiasts! This is an updating of Anderson's previous work, which was a standard for the field (it can be obtain in PDF for free on-line). I highly recommend it for those into security. The discipline and thorough treatment of a wide breath of areas that Anderson provides is just what a true security professional needs. nessuna recensione | aggiungi una recensione
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more. Non sono state trovate descrizioni di biblioteche |
Discussioni correntiNessunoCopertine popolari
Google Books — Sto caricando le informazioni... GeneriSistema Decimale Melvil (DDC)005.8Information Computing and Information Computer programming, programs, data, security Computer SecurityClassificazione LCVotoMedia:
Sei tu?Diventa un autore di LibraryThing. |
It contains a lot of the history regarding the different domains where security engineering is applied. It raised awareness in me regarding potential security pitfalls.
However, the book lacks actionable advice on how to actually BUILD dependable systems.
Will maybe update my review when the other chapters are released. ( )