Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems (Information Security (Wiley)) - Hardcover

Wang, Shuangbao Paul; Ledley, Robert S.

 
9781118168813: Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems (Information Security (Wiley))

Synopsis

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates

"synopsis" may belong to another edition of this title.

About the Author

Shuangbao (Paul) Wang, George Mason University, USA

Robert S. Ledley, Georgetown University, USA

From the Back Cover

Computer Architecture and Security
Fundamentals of Designing Secure Computer Systems

In today's workplace, computer and information security professionals must understand both hardware and software to deploy effective security solutions. Computer Architecture and Security covers a wide range of computer and network hardware, system software, information and data concepts from a security perspective, providing readers with solutions and tools to implement secure computer and information systems. Featuring a careful, in-depth, and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on experiences to help practitioners to render systems immune from attacks.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides Companion Website with lecture notes, security tools and latest updates

This book is geared for graduate students in computer architecture, communications, and information security, as well as engineers, researchers, security professionals, and middleware designers.

From the Inside Flap

Computer Architecture and Security
Fundamentals of Designing Secure Computer Systems

In today's workplace, computer and information security professionals must understand both hardware and software to deploy effective security solutions. Computer Architecture and Security covers a wide range of computer and network hardware, system software, information and data concepts from a security perspective, providing readers with solutions and tools to implement secure computer and information systems. Featuring a careful, in-depth, and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on experiences to help practitioners to render systems immune from attacks.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides Companion Website with lecture notes, security tools and latest updates

This book is geared for graduate students in computer architecture, communications, and information security, as well as engineers, researchers, security professionals, and middleware designers.

"About this title" may belong to another edition of this title.