Full description not available
W**E
Great introduction to the wide world of security
I love this book. I'm not a security professional, just reading it for fun. It's great reading for fun.I especially like all the examples. If you already work in the space, you already know WHY any of this is important. If you don't, then leaving those stories out really makes the subject matter dry and irrelevant. Including it really hits home as to why security is so important to all of us, and it makes the solutions much more intriguing.The author explains things in layman's terms, so although this is a very broad and complex topic, it's very accessible through this book. I also love the author's approach of introducing you to *all* the relevant concerns of security, and then giving you references if you want to learn more (including problems that haven't been solved yet).One thing I found interesting was that having the advantage of living 10 years beyond the end of the book, it becomes clear that many of the current hot topics in security have been predicted by security experts for years. For example, Google just found the first SHA-1 collision, and in the book, Ross reported that an algorithm has been developed to find a collision in 2^69 steps, but it was predicted that it should be possible in 2^60 steps. 10 years later, as I'm reading the book, Google reports they did it with 2^63 computations.If you're a professional, you probably already know all the important stuff from this book. So depending on what you're looking for, it might not be the book for you. If security is this mysterious, complex thing that feels like it's beyond your reach, you'll love this book. It's not like "heads first" security where it just flies by. You may find yourself slogging through the thousand or so pages over a series of eye-straining months. Your husband might get used to seeing you making pained faces around the house while looking at the ceiling as you try to understand something. But it's still fun. Oh also sometimes the author is unexpectedly sarcastic, and that's really fun, too.
M**.
Excellent Study Reference for CISSP-ISSAP
I’m currently endeavoring on a journey to attain the CISSP-ISSAP (architecture level) security certification.While studying for the CISSP exam I was forced to familiarize myself in many areas of security I had previously skirted – thus it was grueling work. Few of the CISSP level exam questions require in-depth knowledge; overall the CISSP requires an eye-in-the-sky view of the entire security field, and how different concepts fit together. At the level of the CISSP there are many good resources and it only took me two weeks of study to prep for a passing score.Studying for the CISSP-ISSAP has been more challenging. Not only is the training availability extremely limited, there are few good study resources for the exam. I understand the ISSAP concentration requires detailed knowledge of the inner workings of many technical systems (and not just those normally administered by security professionals). To pass this exam you not only need to retain that knowledge, but know how it all works in minute detail.A long foreword, but the point being stumbling across this book has been a lucky break. Ross dives into security engineering at the street level and comes up for air only to relate real world cases of security failure and how they can be avoided. Not only does he get down to the detail level required on much of the CISSP-ISSAP curriculum, his book is heavily weighted in the technical control fields that are core to the ISSAP exam.If you’re tasked with engineering security controls in any information system or joining me in studying for the ISSAP concentration I highly recommend this read.This book was published in 2010 making it currently 7 years old. This means there are some glaring exemptions from his review of historical security failures and a bit of weakness in mobile, social and cloud. It should be noted that. Despite being 10 years out of date many of his observations seem eerily prescient given what has occurred during the intervening interval and although lacking in examples pertaining to Social Mobile Analytics and Cloud – he accurately predicted the systemic issues encountered in these areas proving good fundamental coverage still useful in 2017.Trailing note. This is 1080 pages - if you're expecting a casual read look elsewhere, while Ross does an excellent job of keeping this digestible be prepared for some focused attention on every passage.Ross A++
B**N
Textbook Purchase Review
I have just started a course in Security Engineering with the recommended Security Engineering Textbook which I am reviewing. I found the text simple to understand, full of examples that illustrate concepts and I think I enjoy using it.
E**N
A good overview of what security is
This book was has stories about the information security challenges in all parts of life. For a technical book I surprisingly found it a gripping page turner. A very good book with lots and lots of very good information.
G**G
Excellent, readable, current
Certainly a top 5 in its space. Especially notable for its broad coverage and excellent references to other more detailed material. This is a very worthwhile update from the first edition (which is freely available from the author's web site as a PDF).
A**S
Fantastic Resource
This book has been the definitive guide for my embedded and distributed cryptosystems projects thus far. The writing is good--easy and fun to read. The content is incredible, and Bruce Schneier's approval doesn't hurt. I don't think I've ever learned as much in as few pages before.
J**S
a little old but many of the concepts are still ...
a little old but many of the concepts are still relevant and it is incredibly eye opening. I learned much more about current and historical security problems from this book than I did from books less than a year old.
P**H
Worst Book Ever!!
I am a college freshman majoring in Computer Science and I have never come across a book so bad at explaining things. Instead of explaining the concepts clearly, the author just keeps giving weird examples which I find very difficult to follow. He just keeps talking about Government issues, policies, banks, finance, firms etc. I don't know maybe it's my lack of general knowledge which makes it really difficult for me to understand this book.
K**R
Liked it!
very detailed book
H**.
Indian Edition edition selling in Australia
Indian Edition edition selling in Australia. Bad paper and printing quality.
P**R
A book for novices? Definitely
I recently decided to learn more about "security". I suppose that like many novices I equated security with cryptography and went searching on the web. I was lucky to find Anderson's web-site and read a few chapters, "Cryptography" and "Protocols". Then I wondered about the rest of the book and read a bit more.It was an eye opener, I bought the book and I haven't regretted it. The scope covered all the application areas in which I was interested, and added new ones.It is well written to the extent that I found myself reading it for entertainment. Nevertheless it is also a solid academic book with plenty of references to other materials. It is also telling that this book is referenced by every other book on security and cryptography that I have since read.
C**S
A Must Read
Anderson has successfully synthesized an incredibly diverse set of literature and, as a result, the book is useful for any person who is involved in security. The first section of the book outlines different threat models, offers accessible ways to develop and implement security designs, and also addresses issues of economics, psychology, and basic security issues that must be considered from the outset of security planning. Because different threat situations are raised throughout the book the reader will learn to appreciate the value of adopting comprehensive threat planning. This approach is not meant to drive a 'secure everything' mentality but to encourage readers to reflect on, and understand, what is actually being protected, why it is being protected, and what it is being protected from. As a result, a manager or team lead not invested in the day-to-day securing of a principle can have intelligent and critical discussions with their security staff, ensuring that principles are properly identified and resources assigned to ensure desired levels of threat protection. For staff involved in implementing policy, reading this first section may help to couch concerns in a language that is better understood by management. It will also let those same staff members more precisely plan and implement policies that are handed down from higher levels in an organizational framework.In the second section of the book, Anderson addresses a series of 'topic areas' such as multilateral security, banking and bookkeeping, monitoring and metering, security printing and seals, API attacks, copyright, telecom security, and more. In each section he leaves the reader with an excellent topical understanding of the historical issues these areas have encountered, how issues in various sections often relate to one another, and where and why errors in judgement have been made. The regular demonstrations of security failures - often due to side channel attacks - operate as powerful reminders that adequate policies that precisely identify how fault situations unfold are (arguably) amongst the most important elements of any security policy. It also demonstrates how what appear to be robust systems can be made to be quite brittle, thus emphasizing the need to think about how to develop effective defence in depth policies. This section is essential reading for both the actual implementers of security as well as whomever is making purchasing decisions on behalf of organizations. With the rapid growth of the 'security industry' and ever-increasing number of vendors that are invested in selling their latest products/snake oil, this section provides the reader with tools needed to critically interrogate products and make better purchasing and implementation decisions.The final section is, arguably, most needed by mid- to high-level organizational planners. Civil issues are raised - how does security/surveillance impact individuals' rights? - as are step-by-step methodological systems for establishing threat patterns in relation to larger organizational concerns (e.g. profitability, consumer loyalty and trust). It also includes suggested practices for addressing potential security errors introduced in the generation of a digital or coded product, and how to establish an environment conducive to ensuring product- and process-based integrity, authenticity, and security. The final section is particularly needed for anyone looking into compliance seals and assurances. Anderson outlines the positive and deficient aspects of external audits, and also identifies how auditing systems have been gamed by nation-state actors and the reasons behind such gaming. While some organizations may be more concerned about receiving seals for bureaucratic purposes, for the agency that is concerned about the actual security value of the seals, this section provides much-needed resources to understand the nature of seal and certification systems.I cannot recommend this book highly enough. Quite often, security books will emphasize a particular line of attack and bypass the broader conceptual systems underlying the incursion. This book largely takes the opposite track, focusing first on the conceptual deficiencies and the intellectual demands of designing secure systems. It then proceeds to outline attacks that often use the systems' logic to the attackers advantage. As a result, the reader will leave with a critical appreciation of the concepts and implementations of security. The emphasis on the conceptual conditions of security mean that the book will continue to age well, with readers being able to apply what is learned in this book to their work for years to come.
M**A
Completamente necesario
Pese a ser esta segunda edición de 2008 y estar disponible públicamente su versión en PDF, el libro merece la pena tenerlo en papel. Abarca todos los campos posibles en ciberseguridad desde un punto de vista académico. No es un libro enfocado a aquellos que buscan perfeccionar sus habilidades en ataque/defensa, pero sin este tipo de lecturas (el libro es el soporte de tres asignaturas en la Cambridge University), no se adquiere una perspectiva global de todos los aspectos que deben ser tenidos en cuenta a la hora de planificar la defensa o el ataque a un sistema de comunicaciones.
Trustpilot
2 weeks ago
1 month ago