Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 46,07

EUR 19,50 (30%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Security Engineering: A Guide to Building Dependable Distributed Systems par [Anderson, Ross J.]
Publicité sur l'appli Kindle

Security Engineering: A Guide to Building Dependable Distributed Systems 2 , Format Kindle

5.0 étoiles sur 5 2 commentaires client

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 46,07

Description du produit

Revue de presse

At over a thousand pages, this is a comprehensive volume. Engineering & Technology Saturday 7 June 2008

Présentation de l'éditeur

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4822 KB
  • Nombre de pages de l'édition imprimée : 1080 pages
  • Editeur : Wiley; Édition : 2 (5 novembre 2010)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B004BDOZI0
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5 2 commentaires client
  • Classement des meilleures ventes d'Amazon: n°123.100 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  • Voulez-vous nous parler de prix plus bas?

click to open popover

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir les deux commentaires client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché
Des théories, des exemples historiques...
Anderson conduit le lecteur à penser comme un extra-terrestre, hors du respect des règles pour contourner les systèmes de sécurité ou mesurer les risques des systèmes complexes
Remarque sur ce commentaire 2 personnes ont trouvé cela utile. Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus
Format: Relié
Passant en revue les défauts de conception de différents systèmes concernant des environnements différents, comme la maison, l'entreprise ou les besoins militaires, le livre aborde dans le détail les protocoles, les modèles de sécurité et tous les éléments à prendre en compte dès la phase de définition d'une solution. Il permet d'éviter des erreurs qui peuvent s'avérer couteuses si elles doivent être corrigées plus tard. La première partie est agréable à lire, la suite va plus loin dans la technique et pourrait perdre certains lecteurs.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards) 4.1 étoiles sur 5 62 commentaires
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Great introduction to the wide world of security 9 mars 2017
Par Taj Bortz - Publié sur
Format: Relié Achat vérifié
I love this book. I'm not a security professional, just reading it for fun. It's great reading for fun.

I especially like all the examples. If you already work in the space, you already know WHY any of this is important. If you don't, then leaving those stories out really makes the subject matter dry and irrelevant. Including it really hits home as to why security is so important to all of us, and it makes the solutions much more intriguing.

The author explains things in layman's terms, so although this is a very broad and complex topic, it's very accessible through this book. I also love the author's approach of introducing you to *all* the relevant concerns of security, and then giving you references if you want to learn more (including problems that haven't been solved yet).

One thing I found interesting was that having the advantage of living 10 years beyond the end of the book, it becomes clear that many of the current hot topics in security have been predicted by security experts for years. For example, Google just found the first SHA-1 collision, and in the book, Ross reported that an algorithm has been developed to find a collision in 2^69 steps, but it was predicted that it should be possible in 2^60 steps. 10 years later, as I'm reading the book, Google reports they did it with 2^63 computations.

If you're a professional, you probably already know all the important stuff from this book. So depending on what you're looking for, it might not be the book for you. If security is this mysterious, complex thing that feels like it's beyond your reach, you'll love this book. It's not like "heads first" security where it just flies by. You may find yourself slogging through the thousand or so pages over a series of eye-straining months. Your husband might get used to seeing you making pained faces around the house while looking at the ceiling as you try to understand something. But it's still fun. Oh also sometimes the author is unexpectedly sarcastic, and that's really fun, too.
5.0 étoiles sur 5 Excellent Study Reference for CISSP-ISSAP 11 mai 2017
Par Matthew F. - Publié sur
Format: Format Kindle Achat vérifié
I’m currently endeavoring on a journey to attain the CISSP-ISSAP (architecture level) security certification.

While studying for the CISSP exam I was forced to familiarize myself in many areas of security I had previously skirted – thus it was grueling work. Few of the CISSP level exam questions require in-depth knowledge; overall the CISSP requires an eye-in-the-sky view of the entire security field, and how different concepts fit together. At the level of the CISSP there are many good resources and it only took me two weeks of study to prep for a passing score.

Studying for the CISSP-ISSAP has been more challenging. Not only is the training availability extremely limited, there are few good study resources for the exam. I understand the ISSAP concentration requires detailed knowledge of the inner workings of many technical systems (and not just those normally administered by security professionals). To pass this exam you not only need to retain that knowledge, but know how it all works in minute detail.

A long foreword, but the point being stumbling across this book has been a lucky break. Ross dives into security engineering at the street level and comes up for air only to relate real world cases of security failure and how they can be avoided. Not only does he get down to the detail level required on much of the CISSP-ISSAP curriculum, his book is heavily weighted in the technical control fields that are core to the ISSAP exam.

If you’re tasked with engineering security controls in any information system or joining me in studying for the ISSAP concentration I highly recommend this read.

This book was published in 2010 making it currently 7 years old. This means there are some glaring exemptions from his review of historical security failures and a bit of weakness in mobile, social and cloud. It should be noted that. Despite being 10 years out of date many of his observations seem eerily prescient given what has occurred during the intervening interval and although lacking in examples pertaining to Social Mobile Analytics and Cloud – he accurately predicted the systemic issues encountered in these areas proving good fundamental coverage still useful in 2017.

Trailing note. This is 1080 pages - if you're expecting a casual read look elsewhere, while Ross does an excellent job of keeping this digestible be prepared for some focused attention on every passage.

Ross A++
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 It is a good reference book 3 janvier 2015
Par Amazon Customer - Publié sur
Format: Relié Achat vérifié
A very lengthy and dense book. It is a good reference book, but a horrible choice to have budding professionals read to learn the basics. But there seems to be no dearth of information in here.
2 internautes sur 2 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 a little old but many of the concepts are still ... 31 mars 2015
Par jcelis - Publié sur
Format: Format Kindle Achat vérifié
a little old but many of the concepts are still relevant and it is incredibly eye opening. I learned much more about current and historical security problems from this book than I did from books less than a year old.
7 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Incomparable book on information security 2 mai 2001
Par R. Smith - Publié sur
Format: Broché Achat vérifié
Those of us in the computer security business have been mining Ross Anderson's web site for years, since he's done some really unique and important work in the field. Finally he's pulled it into an incredible book, one that's essential for anyone interested in information security.
Two elements combine make this book unique: first, the book manages to cover all of the major topics in the field, and second, the book covers the whole range of attacks that systems can face: technical, procedural and physical. Historically, writers on information security have focused on computers and disembodied "users," downplaying the crucial issues of physical security, perimeters, operating procedures, and the limits of human behavior. This book tries to integrate such concerns into information security thinking, instead of treating them as "special concerns that computer geeks don't really care about."
Best of all, the book is a great read. Ross has a fine way of drawing out the irony we encounter in user behavior, enterprise behavior, and even in the actions of presumed authorities in industry and government. At one point he discusses a government endorsed security evaluation process "which, as mentioned, is sufficient to keep out all attackers but the competent ones."
Ross unabashedly explains several aspects of information security that most writers ignore entirely, like security printing, seals, tamper resistance, and associated procedures. In my own books, reviewers have chided me for including such "irrelevant" topics, even though they play an essential part in making a real system work. As Ross ably points out, most successful attacks these days are pretty mundane and don't involve cryptanalysis or sophisticated protocol hacking. ATM fraud, for example, often relies on pre-computer technology like binoculars to pick up a victim's PIN. This book should open a lot of peoples' eyes.
Ces commentaires ont-ils été utiles ? Dites-le-nous