Cross Oceans Free with $50+ Orders
Menu
Security Engineering: A Guide to Building Dependable Distributed Systems - Wiley Computer Publishing by Ross J. Anderson | Cybersecurity Textbook for IT Professionals & Software Developers | Perfect for Network Security Courses & System Architecture Studies
$54.63
$99.34
Safe 45%
Security Engineering: A Guide to Building Dependable Distributed Systems - Wiley Computer Publishing by Ross J. Anderson | Cybersecurity Textbook for IT Professionals & Software Developers | Perfect for Network Security Courses & System Architecture Studies
Security Engineering: A Guide to Building Dependable Distributed Systems - Wiley Computer Publishing by Ross J. Anderson | Cybersecurity Textbook for IT Professionals & Software Developers | Perfect for Network Security Courses & System Architecture Studies
Security Engineering: A Guide to Building Dependable Distributed Systems - Wiley Computer Publishing by Ross J. Anderson | Cybersecurity Textbook for IT Professionals & Software Developers | Perfect for Network Security Courses & System Architecture Studies
$54.63
$99.34
45% Off
Quantity:
Delivery & Return: Free shipping on all orders over $50
Estimated Delivery: 10-15 days international
10 people viewing this product right now!
SKU: 92024041
Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay
shop
Description
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully upda ... Available boomreads.com/download?i=0470068523Security A Guide to Building Dependable Distributed Systems PDF by Ross J. AndersonRead Security A Guide to Building Dependable Distributed Systems PDF from Wiley,Ross J. AndersonDownload Ross J. Anderson’s PDF E-book Security A Guide to Building Dependable Distributed Systems
More
Shipping & Returns

For all orders exceeding a value of 100USD shipping is offered for free.

Returns will be accepted for up to 10 days of Customer’s receipt or tracking number on unworn items. You, as a Customer, are obliged to inform us via email before you return the item.

Otherwise, standard shipping charges apply. Check out our delivery Terms & Conditions for more details.

Reviews
*****
Verified Buyer
5
Those of us in the computer security business have been mining Ross Anderson's web site for years, since he's done some really unique and important work in the field. Finally he's pulled it into an incredible book, one that's essential for anyone interested in information security.Two elements combine make this book unique: first, the book manages to cover all of the major topics in the field, and second, the book covers the whole range of attacks that systems can face: technical, procedural and physical. Historically, writers on information security have focused on computers and disembodied "users," downplaying the crucial issues of physical security, perimeters, operating procedures, and the limits of human behavior. This book tries to integrate such concerns into information security thinking, instead of treating them as "special concerns that computer geeks don't really care about."Best of all, the book is a great read. Ross has a fine way of drawing out the irony we encounter in user behavior, enterprise behavior, and even in the actions of presumed authorities in industry and government. At one point he discusses a government endorsed security evaluation process "which, as mentioned, is sufficient to keep out all attackers but the competent ones."Ross unabashedly explains several aspects of information security that most writers ignore entirely, like security printing, seals, tamper resistance, and associated procedures. In my own books, reviewers have chided me for including such "irrelevant" topics, even though they play an essential part in making a real system work. As Ross ably points out, most successful attacks these days are pretty mundane and don't involve cryptanalysis or sophisticated protocol hacking. ATM fraud, for example, often relies on pre-computer technology like binoculars to pick up a victim's PIN. This book should open a lot of peoples' eyes.

You Might Also Like