Computer Architecture and Security

Fundamentals of Designing Secure Computer Systems

Nonfiction, Computers, Advanced Computing, Engineering, Computer Engineering
Cover of the book Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shuangbao Paul Wang, Robert S. Ledley ISBN: 9781118168837
Publisher: Wiley Publication: October 25, 2012
Imprint: Wiley Language: English
Author: Shuangbao Paul Wang, Robert S. Ledley
ISBN: 9781118168837
Publisher: Wiley
Publication: October 25, 2012
Imprint: Wiley
Language: English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

More books from Wiley

Cover of the book How Learning Works by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book The Art of Change Leadership by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Comprehensive Enantioselective Organocatalysis by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book The Veterans and Active Duty Military Psychotherapy Progress Notes Planner by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book The Cerebellum by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Zen Meditation in Psychotherapy by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book DNA@Work by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Joint Optimization of Maintenance and Production Policies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Mathe, die man wirklich braucht für Dummies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Harmonic Balance Finite Element Method by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book The New Tycoons by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Nachrichten verschlüsseln für Dummies Junior by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Online Reputation Management For Dummies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Professional Android Sensor Programming by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Italian Renaissance Art by Shuangbao Paul Wang, Robert S. Ledley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy