SmartSellTM - The New Way to Sell Online

Shop over a million Toys in our Huge New Range

The Craft of System Security
By

Rating

Product Description
Product Details

Table of Contents

  • Chapter 1: Introduction
  • Chapter 2: The Old Testament
  • Chapter 3: Old Principles, New World
  • Chapter 4: OS Security
  • Chapter 5: Network Security
  • Chapter 6: Implementation Security
  • Chapter 7: Using Cryptography
  • Chapter 8: Subverting Cryptography
  • Chapter 9: Authentication
  • Chapter 10: Public Key Infrastructure
  • Chapter 11: Standards, Compliance, and Testing
  • Chapter 12: The Web and Security
  • Chapter 13: Office Tools and Security
  • Chapter 14: Money, Time, Property
  • Chapter 15: Formal Methods and Security
  • Chapter 16: Hardware-Based Security
  • Chapter 17: In Search of the Evil Bit
  • Chapter 18: Human Issues
  • Appendix A: Exiled Theory
  • Bibliography
  • Index

Promotional Information

Computer network security is no longer an obscure topic of interest to a handful of academics, government agencies, and hackers; it is a real concern to any member of a modern society. As first time computer security students and newly minted practitioners navigate their careers as software engineers, managers, and lawyers, they need to be exposed to the breadth of the space, and what trends and principles to look out for. The Craft of System Security arms readers with a deep understanding of what they need to know in order to meet today's (and tomorrow's) security challenges. This book presents the modern security practitioner's toolkit; more importantly, this book also takes readers into the deeper world of why these tools exist and how to use them in order to solve real problems. The book gives readers both practical knowledge and an understanding of the fundamentals that will provide an understanding of the issues they will face. To master the toolkit in this way is to understand the art of system security. If a student or professional only buys one book on computer security, this is the book to buy.

About the Author

Professor Sean Smith has been working in information security--attacks and defenses, for industry and government--since before there was a Web. As a post-doc and staff member at Los Alamos National Laboratory, he performed security reviews, designs, analyses, and briefings for a wide variety of public-sector clients; at IBM T.J. Watson Research Center, he designed the security architecture for (and helped code and test) the IBM 4758 secure coprocessor, and then led the formal modeling and verification work that earned it the world's first FIPS 140-1 Level 4 security validation. In July 2000, Sean left IBM for Dartmouth, since he was convinced that the academic education and research environment is a better venue for changing the world. His current work, as PI of the Dartmouth PKI/Trust Lab, investigates how to build trustworthy systems in the real world. Sean was educated at Princeton (A.B., Math) and CMU (M.S., Ph.D., Computer Science), and is a member of Phi Beta Kappa and Sigma Xi.Dr. John Marchesini received a B.S. in Computer Science from the University of Houston in 1999 and, after spending some time developing security software for BindView, headed to Dartmouth to pursue a Ph.D. There, he worked under Professor Sean Smith in the PKI/Trust lab designing, building, and breaking systems. John received his Ph.D. in Computer Science from Dartmouth in 2005 and returned to BindView, this time working in BindView's RAZOR security research group. He conducted numerous application penetration tests and worked closely with architects and developers to design and build secure systems. In 2006, BindView was acquired by Symantec and he became a member of Symantec's Product Security Group, where his role remained largely unchanged. John recently left Symantec and is now the Principal Security Architect at EminentWare LLC.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books » Computers » Networking » General
Home » Books » Computers » Security » Networking
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling The Craft of System Security on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top