The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal econom...

Buy Now From Amazon

Product Review

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  • New
  • Mint Condition
  • Dispatch same day for order received before 12 noon
  • Guaranteed packaging
  • No quibbles returns

Similar Products

Threat Modeling: Designing for SecurityCryptography Engineering: Design Principles and Practical ApplicationsThe Web Application Hacker's Handbook: Finding and Exploiting Security FlawsHacking: The Art of Exploitation, 2nd EditionApplied Cryptography: Protocols, Algorithms and Source Code in CSecrets and Lies: Digital Security in a Networked WorldCryptography and Network Security: Principles and Practice (7th Edition)Blue Team Field Manual (BTFM) (RTFM)Defensive Security Handbook: Best Practices for Securing InfrastructureTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World