Absolutely Australia's Lowest Prices

We won't be beaten by anyone. Guaranteed

Engineering Trustworthy Systems
By

Rating

Product Description
Product Details

Table of Contents

PART 1: What Do You Want?
Chapter 1: What's the Problem?
Chapter 2: Cybersecurity Right-Think
Chapter 3: Value and Mission: Know Thyself
Chapter 4: Harm: Mission in Peril
Chapter 5: Approximating Reality

PART 2: What Could Go Wrong?
Chapter 6: Adversaries: Know Thy Enemy
Chapter 7: Forests of Attack Trees

PART 3: What Are the Building Blocks of Mitigating Risk?
Chapter 8: Countermeasures -- Security Controls
Chapter 9: Trustworthy Hardware -- Bedrock
Chapter 10: Cryptography -- A Sharp Tool
Chapter 11: Authentication
Chapter 12: Authorization
Chapter 13: Detection Foundation
Chapter 14: Detection Systems
Chapter 15: Detection Strategy
Chapter 16: Deterrence and Adversarial Risk

PART 4: How Do You Orchestrate Cybersecurity?
17: Cybersecurity Risk Assessment
Chapter 18: Risk Mitigation and Optimization
Chapter 19: Engineering Fundamentals
Chapter 20: Architecting Cybersecurity
Chapter 21: Assuring Cybersecurity: Getting it Right
Chapter 22: Cyber Situation Understanding: What's Going On
Chapter 23: Command and Control: What to Do About Attack

PART 5: Moving Cybersecurity Forward
Chapter 24: Strategy Policy and Investment
Chapter 25: The Future of Cybersecurity

PART 6: Appendices
App A: Resources

About the Author

Mr. O. Sami Saydjari has been a visionary thought-leader in cybersecurity for over three decades, working for elite organizations, including the Defense Advanced Research Projects Agency (DARPA), National Security Agency, and NASA, among others. He has published more than a dozen landmark papers in the field, provided consultation to national leadership on cybersecurity policy, and educated the public through interviews with major media such as CNN, PBS, ABC, the New York Times, Financial Times, the Wall Street Journal, and Time magazine. Follow the author on Twitter @SamiSaydjari and visit www.samisaydjari.com and www.EngineeringTrustworthySystems.com for more information.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top