Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: •Defining the fundamental nature and full breadth of the cybersecurity problem•Adopting an essential perspective that considers attacks, failures, and attacker mindsets •Developing and implementing risk-mitigating, systems-based solutions•Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
1127953704
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: •Defining the fundamental nature and full breadth of the cybersecurity problem•Adopting an essential perspective that considers attacks, failures, and attacker mindsets •Developing and implementing risk-mitigating, systems-based solutions•Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
49.49 In Stock
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

by O. Sami Saydjari
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

by O. Sami Saydjari

eBook

$49.49  $65.70 Save 25% Current price is $49.49, Original price is $65.7. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including: •Defining the fundamental nature and full breadth of the cybersecurity problem•Adopting an essential perspective that considers attacks, failures, and attacker mindsets •Developing and implementing risk-mitigating, systems-based solutions•Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space

Product Details

ISBN-13: 9781260118186
Publisher: McGraw Hill LLC
Publication date: 08/03/2018
Sold by: Barnes & Noble
Format: eBook
Pages: 512
File size: 38 MB
Note: This product may take a few minutes to download.

About the Author

Mr. O. Sami Saydjari has been a visionary thought-leader in cybersecurity for over three decades, working for elite organizations, including the Defense Advanced Research Projects Agency (DARPA), National Security Agency, and NASA, among others. He has published more than a dozen landmark papers in the field, provided consultation to national leadership on cybersecurity policy, and educated the public through interviews with major media such as CNN, PBS, ABC, the New York Times, Financial Times, the Wall Street Journal, and Time magazine. Follow the author on Twitter @SamiSaydjari and visit www.samisaydjari.com and www.EngineeringTrustworthySystems.com for more information.

Table of Contents

PART 1: What Do You Want?
Chapter 1: What's the Problem?
Chapter 2: Cybersecurity Right-Think
Chapter 3: Value and Mission: Know Thyself
Chapter 4: Harm: Mission in Peril
Chapter 5: Approximating Reality

PART 2: What Could Go Wrong?
Chapter 6: Adversaries: Know Thy Enemy
Chapter 7: Forests of Attack Trees

PART 3: What Are the Building Blocks of Mitigating Risk?
Chapter 8: Countermeasures -- Security Controls
Chapter 9: Trustworthy Hardware -- Bedrock
Chapter 10: Cryptography -- A Sharp Tool
Chapter 11: Authentication
Chapter 12: Authorization
Chapter 13: Detection Foundation
Chapter 14: Detection Systems
Chapter 15: Detection Strategy
Chapter 16: Deterrence and Adversarial Risk

PART 4: How Do You Orchestrate Cybersecurity?
17: Cybersecurity Risk Assessment
Chapter 18: Risk Mitigation and Optimization
Chapter 19: Engineering Fundamentals
Chapter 20: Architecting Cybersecurity
Chapter 21: Assuring Cybersecurity: Getting it Right
Chapter 22: Cyber Situation Understanding: What's Going On
Chapter 23: Command and Control: What to Do About Attack

PART 5: Moving Cybersecurity Forward
Chapter 24: Strategy Policy and Investment
Chapter 25: The Future of Cybersecurity

PART 6: Appendices
App A: Resources

What People are Saying About This

- - Marv Langston

“[A] definitive text [that] delivers insightful philosophy, deep understanding, practical guidance, and detailed instruction for building future systems that mitigate cybersecurity threats.”

- - John M. Poindexter

“The ‘bible’ for cybersecurity, which needs to be consulted as we struggle to solve this enormous threat to our national security.”

- - Steven B. Lipner

“Reflects decades of experience in designing and building secure computer systems.”

- - Roy Maxion

“Cybersecurity practitioners, designers, and researchers will all find that the lessons in this book add inestimable, tangible value to their missions; the depth and breadth of this book is truly impressive.”

- - Dr. Edward G. Amoroso

“One of the great experts in our field [...] has produced one of the finest [...] works in our field.”

- - Jim Carnes

“Perfectly captures the asymmetrical nature of cyberwarfare [and] will help level the playing field and put the adversary on their heels.”

- - Eugene Spafford

“A technical tour-de-force! This is the book I have wanted for over a decade.”

- - Melissa Hathaway

“An authoritative, timeless, and practical guide, [this book] underscores that our opponents’ reach, speed, and understanding of our vulnerabilities currently outmatch our defenses, which is why [...] our future depends on it.”

- - Carl Landwehr

“Distills the lessons of a lifetime. [...] Both comprehensive and easy to read [and] notable for its emphasis on looking at a system as a whole, not just an aggregation of components, and for helping readers understand how to value information and [...] deal with risk.”

From the B&N Reads Blog

Customer Reviews