Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Bild nicht verfügbar
Farbe:
-
-
-
- Herunterladen, um dieses Videos wiederzugeben Flash Player
Dem Autor folgen
OK
Security Engineering: A Guide to Building Dependable Distributed Systems Gebundene Ausgabe – 11. April 2008
-- Bruce Schneier
"This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work."
-- Gary McGraw
This book created the discipline of security engineering
The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy -- and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice.
Here's straight talk about
* Technical engineering basics -- cryptography, protocols, access controls, and distributed systems
*
Types of attack -- phishing, Web exploits, card fraud, hardware hacks, and electronic warfare
*
Specialized protection mechanisms -- what biometrics, seals, smartcards, alarms, and DRM do, and how they fail
*
Security economics -- why companies build insecure systems, why it's tough to manage security projects, and how to cope
*
Security psychology -- the privacy dilemma, what makes security too hard to use, and why deception will keep increasing
*
Policy -- why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it
- ISBN-100470068523
- ISBN-13978-0470068526
- Auflage2.
- HerausgeberWiley
- Erscheinungstermin11. April 2008
- SpracheEnglisch
- Abmessungen19.81 x 6.6 x 24.13 cm
- Seitenzahl der Print-Ausgabe1088 Seiten
Dieses Buch gibt es in einer neuen Auflage:
Kunden, die diesen Artikel angesehen haben, haben auch angesehen
Produktbeschreibungen
Pressestimmen
Klappentext
-- Bruce Schneier
"This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work."
-- Gary McGraw
This book created the discipline of security engineering
The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy -- and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice.
Here's straight talk about
* Technical engineering basics -- cryptography, protocols, access controls, and distributed systems
*
Types of attack -- phishing, Web exploits, card fraud, hardware hacks, and electronic warfare
*
Specialized protection mechanisms -- what biometrics, seals, smartcards, alarms, and DRM do, and how they fail
*
Security economics -- why companies build insecure systems, why it's tough to manage security projects, and how to cope
*
Security psychology -- the privacy dilemma, what makes security too hard to use, and why deception will keep increasing
*
Policy -- why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it
Buchrückseite
— Bruce Schneier
"This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work."
— Gary McGraw
This book created the discipline of security engineering
The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy — and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice.
Here's straight talk about
- Technical engineering basics — cryptography, protocols, access controls, and distributed systems
Types of attack — phishing, Web exploits, card fraud, hardware hacks, and electronic warfare
Specialized protection mechanisms — what biometrics, seals, smartcards, alarms, and DRM do, and how they fail
Security economics — why companies build insecure systems, why it's tough to manage security projects, and how to cope
Security psychology — the privacy dilemma, what makes security too hard to use, and why deception will keep increasing
Policy — why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it
Über den Autor und weitere Mitwirkende
Produktinformation
- Herausgeber : Wiley
- Erscheinungstermin : 11. April 2008
- Auflage : 2.
- Sprache : Englisch
- Seitenzahl der Print-Ausgabe : 1088 Seiten
- ISBN-10 : 0470068523
- ISBN-13 : 978-0470068526
- Abmessungen : 19.81 x 6.6 x 24.13 cm
- Amazon Bestseller-Rang: Nr. 1.410.124 in Bücher (Siehe Top 100 in Bücher)
- Nr. 792 in Programmieralgorithmen
- Nr. 1.593 in Netzwerke
- Nr. 1.717 in Computernetzwerke
- Kundenrezensionen:
Informationen zum Autor

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.
Kundenrezensionen
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern5 Sterne69%21%4%1%5%69%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern4 Sterne69%21%4%1%5%21%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern3 Sterne69%21%4%1%5%4%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern2 Sterne69%21%4%1%5%1%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern1 Stern69%21%4%1%5%5%
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahren Sie mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.Spitzenrezensionen aus Deutschland
Es gab ein Problem beim Filtern der Rezensionen. Bitte lade die Seite neu.
-
Bewertet in Deutschland am 7. Mai 2013Formatieren: Gebundenes BuchVerifizierter KaufThe author even succeeds in describing kerberos in an understandable way. I especially appreciate the many real-world examples that cover all sorts of application domains (hospitals, airports, military, government, banks, ...).
The book is available electronically but I just had to buy the paper version (and recommend it to all my friends, well at least those that appreciate a bit of IT with lots of gory details :)).
- Bewertet in Deutschland am 5. Februar 2010Formatieren: Gebundenes BuchDas Buch ist eine Pflichtlektüre bevor man beginnt sicherheitskritische Systeme zu entwickeln.
Der Autor erklärt, dass die meisten Sicherheitsprobleme durch eine eingeschränkte Sicht auf das zu entwickelnde System entstehen. So wird ein Kryptologe zwar sehr gute Kryptoalgorithmen auswählen und diese auch gut implementieren können. Allerdings wird er sich wenig Gedanken über Aspekte wie physikalische Zugangssicherheit oder Social Engineering machen.
Security Engineering gibt hier einen guten Überblick über verschiedene Aspekte der sicheren Systemgestaltung und zeigt mögliche Schwachstellen auf. Die Themen reichen dabei vom elektrischen Garagentoröffner mit Fernbedienung, über Geld- und Kreditkarten, Freund-Feind Erkennung bei Militärflugzeugen, bis zur Absicherung von Kernwaffen gegen Missbrauch. Auch wenn die letzten Themen vielleicht für die meisten Personen etwas weit weg sind, sind diese sehr gute Beispiele um generelle Prinzipien zu erläutern.
Selbstverständlich kann das Buch bei keinem Thema in die Tiefe gehen. Dies ist auch nicht die Absicht des Autors. Die Detaillierung ist sehr gut gewählt und reicht aus um die Zusammenhänge der einzelnen Themenkomplexe gut zu verstehen.
- Bewertet in Deutschland am 26. August 2014Formatieren: Gebundenes BuchVerifizierter KaufMehr als 20 Seiten im Buch sind nicht lesbar! Entweder ist die Schrift doppelt gedruckt oder die Tinte ist so schwach, dass man nichts erkennen kann. Bei einem 60 Euro teuren Buch ist das nicht hinnehmbar. Ich habe das Buch zurückgeschickt und hoffe, dass die nächste Ausgabe eine höhere Qualität aufweist.
Spitzenrezensionen aus anderen Ländern
-
Christopher ParsonsBewertet in Kanada am 24. September 20115,0 von 5 Sternen A Must Read
Formatieren: Gebundenes BuchVerifizierter KaufAnderson has successfully synthesized an incredibly diverse set of literature and, as a result, the book is useful for any person who is involved in security. The first section of the book outlines different threat models, offers accessible ways to develop and implement security designs, and also addresses issues of economics, psychology, and basic security issues that must be considered from the outset of security planning. Because different threat situations are raised throughout the book the reader will learn to appreciate the value of adopting comprehensive threat planning. This approach is not meant to drive a 'secure everything' mentality but to encourage readers to reflect on, and understand, what is actually being protected, why it is being protected, and what it is being protected from. As a result, a manager or team lead not invested in the day-to-day securing of a principle can have intelligent and critical discussions with their security staff, ensuring that principles are properly identified and resources assigned to ensure desired levels of threat protection. For staff involved in implementing policy, reading this first section may help to couch concerns in a language that is better understood by management. It will also let those same staff members more precisely plan and implement policies that are handed down from higher levels in an organizational framework.
In the second section of the book, Anderson addresses a series of 'topic areas' such as multilateral security, banking and bookkeeping, monitoring and metering, security printing and seals, API attacks, copyright, telecom security, and more. In each section he leaves the reader with an excellent topical understanding of the historical issues these areas have encountered, how issues in various sections often relate to one another, and where and why errors in judgement have been made. The regular demonstrations of security failures - often due to side channel attacks - operate as powerful reminders that adequate policies that precisely identify how fault situations unfold are (arguably) amongst the most important elements of any security policy. It also demonstrates how what appear to be robust systems can be made to be quite brittle, thus emphasizing the need to think about how to develop effective defence in depth policies. This section is essential reading for both the actual implementers of security as well as whomever is making purchasing decisions on behalf of organizations. With the rapid growth of the 'security industry' and ever-increasing number of vendors that are invested in selling their latest products/snake oil, this section provides the reader with tools needed to critically interrogate products and make better purchasing and implementation decisions.
The final section is, arguably, most needed by mid- to high-level organizational planners. Civil issues are raised - how does security/surveillance impact individuals' rights? - as are step-by-step methodological systems for establishing threat patterns in relation to larger organizational concerns (e.g. profitability, consumer loyalty and trust). It also includes suggested practices for addressing potential security errors introduced in the generation of a digital or coded product, and how to establish an environment conducive to ensuring product- and process-based integrity, authenticity, and security. The final section is particularly needed for anyone looking into compliance seals and assurances. Anderson outlines the positive and deficient aspects of external audits, and also identifies how auditing systems have been gamed by nation-state actors and the reasons behind such gaming. While some organizations may be more concerned about receiving seals for bureaucratic purposes, for the agency that is concerned about the actual security value of the seals, this section provides much-needed resources to understand the nature of seal and certification systems.
I cannot recommend this book highly enough. Quite often, security books will emphasize a particular line of attack and bypass the broader conceptual systems underlying the incursion. This book largely takes the opposite track, focusing first on the conceptual deficiencies and the intellectual demands of designing secure systems. It then proceeds to outline attacks that often use the systems' logic to the attackers advantage. As a result, the reader will leave with a critical appreciation of the concepts and implementations of security. The emphasis on the conceptual conditions of security mean that the book will continue to age well, with readers being able to apply what is learned in this book to their work for years to come.
-
PeterBewertet in Großbritannien am 6. Dezember 20145,0 von 5 Sternen A book for novices? Definitely
Formatieren: Gebundenes BuchVerifizierter KaufI recently decided to learn more about "security". I suppose that like many novices I equated security with cryptography and went searching on the web. I was lucky to find Anderson's web-site and read a few chapters, "Cryptography" and "Protocols". Then I wondered about the rest of the book and read a bit more.
It was an eye opener, I bought the book and I haven't regretted it. The scope covered all the application areas in which I was interested, and added new ones.
It is well written to the extent that I found myself reading it for entertainment. Nevertheless it is also a solid academic book with plenty of references to other materials. It is also telling that this book is referenced by every other book on security and cryptography that I have since read.
-
Works At HomeBewertet in den USA am9. März 20175,0 von 5 Sternen Great introduction to the wide world of security
Formatieren: Gebundenes BuchVerifizierter KaufI love this book. I'm not a security professional, just reading it for fun. It's great reading for fun.
I especially like all the examples. If you already work in the space, you already know WHY any of this is important. If you don't, then leaving those stories out really makes the subject matter dry and irrelevant. Including it really hits home as to why security is so important to all of us, and it makes the solutions much more intriguing.
The author explains things in layman's terms, so although this is a very broad and complex topic, it's very accessible through this book. I also love the author's approach of introducing you to *all* the relevant concerns of security, and then giving you references if you want to learn more (including problems that haven't been solved yet).
One thing I found interesting was that having the advantage of living 10 years beyond the end of the book, it becomes clear that many of the current hot topics in security have been predicted by security experts for years. For example, Google just found the first SHA-1 collision, and in the book, Ross reported that an algorithm has been developed to find a collision in 2^69 steps, but it was predicted that it should be possible in 2^60 steps. 10 years later, as I'm reading the book, Google reports they did it with 2^63 computations.
If you're a professional, you probably already know all the important stuff from this book. So depending on what you're looking for, it might not be the book for you. If security is this mysterious, complex thing that feels like it's beyond your reach, you'll love this book. It's not like "heads first" security where it just flies by. You may find yourself slogging through the thousand or so pages over a series of eye-straining months. Your husband might get used to seeing you making pained faces around the house while looking at the ceiling as you try to understand something. But it's still fun. Oh also sometimes the author is unexpectedly sarcastic, and that's really fun, too.
-
Hasan R.Bewertet in Australien am 14. Juli 20191,0 von 5 Sternen Indian Edition edition selling in Australia
Formatieren: TaschenbuchVerifizierter KaufIndian Edition edition selling in Australia. Bad paper and printing quality.
-
Kaustubh NagwekarBewertet in Indien am 25. Juni 20195,0 von 5 Sternen Liked it!
Formatieren: TaschenbuchVerifizierter Kaufvery detailed book
