Free Security Engineering Book, A Guide to Building Dependable Distributed Systems by Ross Anderson

Look around you. Computers and networks are everywhere, enabling an intricate web of complex human activities: education, commerce, entertainment, research, manufacturing, health management, human communication, even war. Of the two main technological underpinnings of this amazing proliferation, one is obvious: The breathtaking pace with which advances in microelectronics and chip design have been bringing us faster and faster hardware. This book tells the story of the other intellectual enterprise which is crucially fueling the computer revolution: Efcient algorithms. It is a fascinating story. Come close and listen good …

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters.This is changing, and quickly. Most records are now electronic, from bank accounts to registers of real property; and transactions are increasingly electronic, as shopping moves to the Internet.The essence of good security engineering is understanding the potential threats to a system, then applying an appropriate mix of protective measures—both technological and organizational—to control them. Knowing what has worked, and more importantly what has failed, in other applications is a great help in developing judgment. It can also save a lot of money. The purpose of this book is to give a solid introduction to security engineering, as we understand it at the beginning of the twenty-first century.

Best of all, the entire contents of the book are completely FREE

Preface   

Chapter 1: What is Security Engineering?
Chapter 2: Protocols
Chapter 3: Passwords
Chapter 4: Access Control
Chapter 5: Cryptography
Chapter 6: Distributed Systems
Chapter 7: Multilevel Security
Chapter 8: Multilateral Security
Chapter 9: Banking and Bookkeeping
Chapter 10: Monitoring Systems
Chapter 11: Nuclear Command and Control
Chapter 12: Security Printing and Seals
Chapter 13: Biometrics
Chapter 14: Physical Tamper Resistance
Chapter 15: Emission Security
Chapter 16: Electronic and Information Warfare
Chapter 17: Telecom System Security
Chapter 18: Network Attack and Defense
Chapter 19: Protecting E-Commerce Systems
Chapter 20: Copyright and Privacy Protection
Chapter 21: E-Policy
Chapter 22: Management Issues
Chapter 23: System Evaluation and Assurance
Chapter 24: Conclusions
Bibliography