Computer Architecture and Security and over 2 million other books are available for Amazon Kindle . Learn more
  • RRP: £79.22
  • You Save: £10.63 (13%)
FREE Delivery in the UK.
Only 3 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Computer Architecture and... has been added to your Basket
Trade in your item
Get a £10.00
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems (Information Security (Wiley)) Hardcover – 19 Dec 2014

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
"Please retry"
£61.16 £61.16
£68.59 FREE Delivery in the UK. Only 3 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Special Offers and Product Promotions

  • When you trade in £15 or more you’ll receive an additional £5 Gift Card for the next time you spend £10 or more.

Trade In this Item for up to £10.00
Trade in Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems (Information Security (Wiley)) for an Amazon Gift Card of up to £10.00, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

More About the Author

Discover books, learn about writers, and more.

Product Description

From the Back Cover

In today′s workplace, computer and information security professionals must understand both hardware and software to deploy effective security solutions. Computer Architecture and Security covers a wide range of computer and network hardware, system software, information and data concepts from a security perspective, providing readers with solutions and tools to implement secure computer and information systems. Featuring a careful, in–depth, and innovative introduction to modern computer systems and patent–pending technologies in computer security, the text integrates design considerations with hands–on experiences to help practitioners to render systems immune from attacks.  

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual–port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Includes the latest patent–pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co–authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website with lecture notes, security tools and latest updates

This book is geared for graduate students in computer architecture, communications, and information security, as well as engineers, researchers, security professionals, and middleware designers.

Companion website for the book:

About the Author

Shuangbao (Paul) Wang is the inventor of a secure computer system. He is the recipient of Link Fellowship Award in advanced simulation and training. He holds four patents; three of them have been transferred into industry and put into production. One of his students appeared in Time Magazine for doing his class project which he commercialized and still pursues. In addition, one of his published papers ranked the first place in Science Direct s TOP 25 Hottest Articles. His research was awarded the Best Invention Award in Entrepreneurship Week USA at Mason. More recently, he received two University Technology Transfer Awards.

Dr. Wang has extensive experience in academia, industry, and public services. He has held many posts, including professor, director, CEO, CIO/CTO and ranking positions in public services. He is currently a professor at George Mason University. Dr. Wang served as the Chief Information and Technology Officer at National Biomedical Research Foundation (USA)/Georgetown University Medical Center. Earlier, he was the director of the Institute of Information Science and Technology at Qingdao (ISTIQ) where he oversaw more than 120 faculty and staff, acquired 12 grants, won 18 academic awards and was the PI for over 15 grants/projects.

Robert S. Ledley is the inventor of CT scanner and is a member of the National Academy of Science (USA). He has numerous publications in Science and several books, and has hundreds of patents and grants. Dr. Ledley is the recipient of the National Medal of Technology (USA) that was awarded to him by President Clinton in 1997. He was admitted to the National Inventors Hall of Fame in 1990.

Dr. Ledley has been the president of the National Biomedical Research Foundation (USA) since 1960. He is also a professor (emeritus) at Georgetown University. Dr. Ledley is the editor–in–chief of four international journals. He has testified before the House and was interviewed by the Smithsonian Institution.

Inside This Book (Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) 6 reviews
4 of 5 people found the following review helpful
Very Disappointed. Great combination of Architecture & Security, but no OS perspective. Poor book on architecture. 6 Feb. 2013
By Fred Seigneur - Published on
Format: Hardcover Verified Purchase
The author's English is poor. That could have been easily fixed with good editing.

The summaries of computer history and Internet history were good. But, the Timeline of Computer Security History only covered hackers and penetrations. The history of computer security hardware/software architectures was totally absent. Nothing on MULTICS, nothing on security kernels, nothing on the Orange Book, etc., nothing on encryption and authentication.

While high level computer architecture is addressed, the treatment is minimalist. Certainly not a book for an engineering student.

A book on computer architecture and security is like a 2 legged stool without a treatment of how a secure operating system can use appropriate hardware features to ensure confidentiality and integrity of user data and programs, while maximizing availability.

What portions of the author's patent application that are covered in the book do not explain how it is unique. It appears in many ways similar to the solutions created by the Trusted Computing Group ([...]).

With some work, a later edition of this book could be worth the price.
Four Stars 12 April 2015
By Theresa - Published on
Format: Kindle Edition Verified Purchase
Great Reference!
0 of 1 people found the following review helpful
I enjoyed this book 10 Aug. 2014
By Sean P. Richards - Published on
Format: Kindle Edition Verified Purchase
It cleared up a lot of the confusion I had about computers. It talks about assembly various aspects of the computer. If you are looking to get into computer hardware or software development it is a book book to have under your cap
0 of 3 people found the following review helpful
Very useful book for those who need to know computer security and Architecture 30 Mar. 2013
By Michael s Woldemedhin - Published on
Format: Hardcover
The author (Professor Shuangbao (Paul) Wang) is my instructor. The book is very important and it concentrate and give more emphasis on major computer architecture & security concepts and it shows how students apply those concepts practically.
0 of 4 people found the following review helpful
Very Practical and Useful 26 Mar. 2013
By Harry - Published on
Format: Hardcover
I'm using this textbook for my class in computer architecture. I find it very useful as it doesn't only explains theory, it simplifies basic computer concept and combine it with practical concept in computer program.

Most of the exercise are practical base questions which requires critical thinking in computer science that will help you understand computing concept.

I will recommend this textbook for both beginners and advance learners.
Were these reviews helpful? Let us know