Look around you. Computers and networks are everywhere, enabling an intricate web of complex human activities: education, commerce, entertainment, research, manufacturing, health management, human communication, even war. Of the two main technological underpinnings of this amazing proliferation, one is obvious: The breathtaking pace with which advances in microelectronics and chip design have been bringing us faster and faster hardware. This book tells the story of the other intellectual enterprise which is crucially fueling the computer revolution: Efcient algorithms. It is a fascinating story. Come close and listen good …
For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters.This is changing, and quickly. Most records are now electronic, from bank accounts to registers of real property; and transactions are increasingly electronic, as shopping moves to the Internet.The essence of good security engineering is understanding the potential threats to a system, then applying an appropriate mix of protective measures—both technological and organizational—to control them. Knowing what has worked, and more importantly what has failed, in other applications is a great help in developing judgment. It can also save a lot of money. The purpose of this book is to give a solid introduction to security engineering, as we understand it at the beginning of the twenty-first century.
Best of all, the entire contents of the book are completely FREE
![]() |
Preface
Chapter 1: What is Security Engineering? |