Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Kindle Price: £35.51

Save £21.99 (38%)

includes VAT*
* Unlike print books, digital books are subject to VAT.

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Security Engineering: A Guide to Building Dependable Distributed Systems by [Anderson, Ross J.]
Kindle App Ad

Security Engineering: A Guide to Building Dependable Distributed Systems Kindle Edition

4.9 out of 5 stars 21 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
£35.51

Length: 1080 pages

Kindle Books from 99p
Load up your Kindle library before your next holiday -- browse over 500 Kindle Books on sale from 99p until 31 August, 2016. Shop now

Product Description

Review

At over a thousand pages, this is a comprehensive volume. Engineering & Technology Saturday 7 June 2008

From the Back Cover

"Security engineering is different from any other kind of programming. . . . if you′re even thinking of doing any security engineering, you need to read this book."
Bruce Schneier

"This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work."
Gary McGraw

This book created the discipline of security engineering

The world has changed radically since the first edition was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. New applications, from search to social networks to electronic voting machines, provide new targets. And terrorism has changed the world. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice.

Here′s straight talk about

  • Technical engineering basics cryptography, protocols, access controls, and distributed systems
  • Types of attack phishing, Web exploits, card fraud, hardware hacks, and electronic warfare

  • Specialized protection mechanisms what biometrics, seals, smartcards, alarms, and DRM do, and how they fail

  • Security economics why companies build insecure systems, why it′s tough to manage security projects, and how to cope

  • Security psychology the privacy dilemma, what makes security too hard to use, and why deception will keep increasing

  • Policy why governments waste money on security, why societies are vulnerable to terrorism, and what to do about it


Product details

  • Format: Kindle Edition
  • File Size: 4822 KB
  • Print Length: 1080 pages
  • Publisher: Wiley; 2 edition (5 Nov. 2010)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B004BDOZI0
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Not Enabled
  • Average Customer Review: 4.9 out of 5 stars 21 customer reviews
  • Amazon Bestsellers Rank: #298,800 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images or tell us about a lower price?


Customer Reviews

4.9 out of 5 stars
5 star
19
4 star
2
3 star
0
2 star
0
1 star
0
See all 21 customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
Think you are an expert on computer security? Yes? Well, no matter if you can do triple-DES in your head, by carefully reading this book (and learning its lessons) you will find many holes in any security system you have ever designed. Guess what? They don't need to crack your 1024 bit key to thwart your procedures -- there's at least a hundred ways to go around encryption.
Ross Anderson surveys the entire spectrum of contemporary techno-security, from nuclear weapons to the electric meters used in South Africa, and tells you the nuts-n-bolts of how they are architected, and where things fall apart. What becomes clear is that perfect security doesn't exist in the real world, so you need to create "security in depth", where you secure all aspects of your enterprise. Attacks can come from the CEO, your customer, the janitor, the designer, or a passing crack head. In fact, the biggest threat is time itself -- a procedure secure today will become vulnerable in a couple of years if you don't treat security as a living, growing, changing, high-priority part of your enterprise.
Early in the book he opened my eyes -- I know a thing or two about security, yet his example of a military IFF system blew me away. If I had been asked, I would have swore it was a perfect system. Yet, with a simple little trick, the enemy not only defeated it but used it as a weapon. There's a hundred head-slapping moments in this book where you mutter "holy crap!" when you see how vulnerable some things have been.
Look, just buy the damn book, ok? If you have any responsibility for security, you need it. End of story..
Comment 31 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book does so much more than guiding the reader through the design of distributed systems. It is the most comprehensive and general definition and illustration of information security that I have ever seen in one place. This is a book that can teach you to look at the world through security glasses so to speak and that of course is a prerequisite for security engineering. It is also a good thing to be able to do if you need to evaluate security measures for quality and appropriateness.
The way Ross Anderson goes about this task is systematic and pedagogical. He has obviously been lecturing for many years and is both an excellent presenter and a person demonstrating a good understanding of learning curves. Both the book as a whole and the individual chapters have been constructed in such a way that the reader can give up at various points of complexity without losing the plot altogether and simply start at the beginning of the following chapter for a less deep education than if he read and understood everything but nevertheless gaining a comprehensive feel for the nature of security and how to tackle its implementation. This design also enables the book to be used either as a textbook or as a reference work. Very smart - many technical authors could learn something from observing how Ross goes about it.
I also like that each chapter ends with a discussion of possible research projects, literature recommendations and of course a summary. The only irritating thing is that there are too many stupid typos such as missing words, things which another read-through by the editor should have caught. An example: `...using the key in Figure 5.7, it enciphers to TB while rf enciphers to OB...' should be `...using the key in Figure 5.7, rd enciphers to TB while rf enciphers to OB...
Read more ›
Comment 12 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover
If you're interested in cyber (and physical) security in any way or have a few subjects touching on the topic at university or at a technical colleague this book is a must.

It focuses very much on secure systems and their implementation, while at the same time acknowledging the drawbacks that plague secure systems every day. The topic range is extremely broad and the author does indeed have great knowledge regarding all the topics he writes about.

If you're unsure if this book is for you you should go to Robert Andersons website and download the 1st edition for free.
Comment 8 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
The best general Information Security introduction I�ve read. Very readable, with lots of references, Ross combines a wealth of practical experience with his academic prowess. Note that whilst he explains much of the technology in detail, it is not technology-specific in the way of, say, Hacking Exposed. This is not really a �how to do IS in 10 easy steps� book - it is more reflective, and questions many traditional assumptions. It also takes a critical look at many of the issues involved with physical security, though does not cover Disaster Recovery/ Business Continuity Planning.
Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Security Engineering combined with Ross's website is a great service to Computer Security professionals and Security researchers.
I used to spend countess hours searching for information on banking security and other topics, since I got this book, my time is better spent analysing information rather than searching. The book has excellent references and resources. I am amazed at the amount of information this book contains.
Security Engineering is a great text book for my Security Courses.
I sincerely hope that Ross will write some more books soon.
Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

click to open popover