Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall
Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.
After School opened, It was changed to other book. So I sold it $20.00 to other school.
anyway it is a good book as a reference.
This book tells about security in many point of views. It's totally open-minding. I recommend for everyone who wants to be a Security Information Professional.Published on March 21, 2013 by Giordanno Martins
I found the book very interesting to read as a textbook becasue it draws many examples from everyday applications. Read morePublished on October 18, 2007 by Toks Aluko
The title is maybe misleading. It is not really a guide that will show you a procedure step by step 'how to do' to build secure systems as most engineering books do. Read morePublished on July 4, 2007 by Olivier Langlois
The book is interesting but it's starting to show signs of it's age. I think the last revision of it was 2001, so the examples are good, yet aged. Read morePublished on March 18, 2007 by P. KNUTH
This is certainly a good book for getting introduced to most high-level architectural concepts related to Network security, cryptography, mandatory/multi-level access control etc. Read morePublished on March 29, 2006 by Jonathan Smith
This book is a must own and a must read. Ross Anderson may tweak people's noses on occassion...but usually because they need tweaking. Get this book now. Really.Published on March 2, 2006 by Gary McGraw
This is an excellent book on Security Engineering. While I don't mind the anti American anecdotes, I wasn't pleased to see Abdulrahman and terrorist being used close to each other. Read morePublished on December 10, 2005