PERHAPS A GIFT VOUCHER FOR MUM?: MOTHER'S DAY

Close Notification

Your cart does not contain any items

Engineering Trustworthy Systems

Get Cybersecurity Design Right the First Time

O. Sami Saydjari

$158.95   $142.90

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
McGraw-Hill Education
18 July 2018
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, 

authenticity, or access to any online entitlements included with the product.

Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks

This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.

Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: 

• Defining the fundamental nature and full breadth of the cybersecurity problem • Adopting an essential perspective that considers attacks, failures, and attacker mindsets  • Developing and implementing risk-mitigating, systems-based solutions • Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically

address the entire complex attack space 

By:  
Imprint:   McGraw-Hill Education
Country of Publication:   United States
Dimensions:   Height: 229mm,  Width: 185mm,  Spine: 28mm
Weight:   864g
ISBN:   9781260118179
ISBN 10:   1260118177
Pages:   592
Publication Date:  
Audience:   College/higher education ,  Primary
Format:   Paperback
Publisher's Status:   Active
PART 1: What Do You Want? Chapter 1: What's the Problem? Chapter 2: Cybersecurity Right-Think Chapter 3: Value and Mission: Know Thyself Chapter 4: Harm: Mission in Peril Chapter 5: Approximating Reality PART 2: What Could Go Wrong? Chapter 6: Adversaries: Know Thy Enemy Chapter 7: Forests of Attack Trees PART 3: What Are the Building Blocks of Mitigating Risk? Chapter 8: Countermeasures -- Security Controls Chapter 9: Trustworthy Hardware -- Bedrock Chapter 10: Cryptography -- A Sharp Tool Chapter 11: Authentication Chapter 12: Authorization Chapter 13: Detection Foundation Chapter 14: Detection Systems Chapter 15: Detection Strategy Chapter 16: Deterrence and Adversarial Risk PART 4: How Do You Orchestrate Cybersecurity? 17: Cybersecurity Risk Assessment Chapter 18: Risk Mitigation and Optimization Chapter 19: Engineering Fundamentals Chapter 20: Architecting Cybersecurity Chapter 21: Assuring Cybersecurity: Getting it Right Chapter 22: Cyber Situation Understanding: What's Going On Chapter 23: Command and Control: What to Do About Attack PART 5: Moving Cybersecurity Forward Chapter 24: Strategy Policy and Investment Chapter 25: The Future of Cybersecurity PART 6: Appendices App A: Resources

Mr. O. Sami Saydjari has been a visionary thought-leader in cybersecurity for over three decades, working for elite organizations, including the Defense Advanced Research Projects Agency (DARPA), National Security Agency, and NASA, among others. He has published more than a dozen landmark papers in the field, provided consultation to national leadership on cybersecurity policy, and educated the public through interviews with major media such as CNN, PBS, ABC, the New York Times, Financial Times, the Wall Street Journal, and Time magazine. Follow the author on Twitter @SamiSaydjari and visit www.samisaydjari.com and www.EngineeringTrustworthySystems.com for more information.

Reviews for Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

"""[A] definitive text [that] delivers insightful philosophy, deep understanding, practical guidance, and detailed instruction for building future systems that mitigate cybersecurity threats.""--Marv Langston, Former Navy CIO ""-"" (5/4/2018 12:00:00 AM) ""A technical tour-de-force! This is the book I have wanted for over a decade.""--Eugene Spafford, Professor of Computer Science ""-"" (5/4/2018 12:00:00 AM) ""An authoritative, timeless, and practical guide, [this book] underscores that our opponents' reach, speed, and understanding of our vulnerabilities currently outmatch our defenses, which is why [...] our future depends on it.""--Melissa Hathaway, former cyber advisor to ""-"" (5/4/2018 12:00:00 AM) ""Cybersecurity practitioners, designers, and researchers will all find that the lessons in this book add inestimable, tangible value to their missions; the depth and breadth of this book is truly impressive.""--Roy Maxion, PhD, Research Professor, Computer ""-"" (5/4/2018 12:00:00 AM) ""Distills the lessons of a lifetime. [...] Both comprehensive and easy to read [and] notable for its emphasis on looking at a system as a whole, not just an aggregation of components, and for helping readers understand how to value information and [...] deal with risk.""--Carl Landwehr, IEEE Fellow and member ""-"" (5/4/2018 12:00:00 AM) ""One of the great experts in our field [...] has produced one of the finest [...] works in our field.""--Dr. Edward G. Amoroso, CEO of TAG ""-"" (5/4/2018 12:00:00 AM) ""Perfectly captures the asymmetrical nature of cyberwarfare [and] will help level the playing field and put the adversary on their heels.""--Jim Carnes, former Chief of Security Testing ""-"" (5/4/2018 12:00:00 AM) ""Reflects decades of experience in designing and building secure computer systems.""--Steven B. Lipner, Member of the ""-"" (5/4/2018 12:00:00 AM) ""The 'bible' for cybersecurity, which needs to be consulted as we struggle to solve this enormous threat to our national security.""--John M. Poindexter, PhD, VADM, USN(ret), ""-"" (5/4/2018 12:00:00 AM)"


See Also