Search Books
Ghrelin in Health and Disea… Outsourcing Maintenance Ser…

Security Basics for Computer Architects (Synthesis Lectures on Computer Architecture)

Author Ruby B. Lee
Publisher Morgan & Claypool Publishers
Category Paperback
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
34.00 40.00 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $9.99

✓ Usually ships in 24 hours

Share:
Book Details
Author(s)Ruby B. Lee
ISBN / ASIN1627051554
ISBN-139781627051552
AvailabilityUsually ships in 24 hours
Sales Rank1,720,751
CategoryPaperback
MarketplaceUnited States 🇺🇸

Description

Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support for security into all future computers and embedded computing devices and appliances. I have tried to keep the book short, which means that many interesting topics and applications could not be included. What the book focuses on are the fundamental security concepts, across different security communities, that should be understood by any computer architect trying to design or evaluate security-aware computer architectures.

The book is also written to be accessible to a more general audience interested in the basic security technologies that can be used to improve cyber security. By understanding the concepts behind the security terminology, the interested reader would understand more clearly the frequent security breaches being reported in the news and be able to critique or even help propose effective security solutions.

Table of Contents: Preface / Threat-Based Design / Security Policy Models / Access Control / Cryptography for Confidentiality and Integrity / Public-Key Crytography / Security Protocols / Summary / Bibliography / Appendix: Further Readings / Author's Biography

HANS-GUNTER HEUMANN : BEST OF PIANO CLASSICS 50 FAMOUS…
View
Please Try to Remember the First of Octember
View
The Bear Scouts
View
Pyramid
View
Love is Walking Hand in Hand
View
Dr. Karyn's Guide To The Teen Years
View
For Whom the Bell Tolls
View
Cricket World Cup Pocket Annual 1999
View
Rainbow Warrior
View