Computer Architecture and Security

Fundamentals of Designing Secure Computer Systems

Nonfiction, Computers, Advanced Computing, Engineering, Computer Engineering
Cover of the book Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shuangbao Paul Wang, Robert S. Ledley ISBN: 9781118168837
Publisher: Wiley Publication: October 25, 2012
Imprint: Wiley Language: English
Author: Shuangbao Paul Wang, Robert S. Ledley
ISBN: 9781118168837
Publisher: Wiley
Publication: October 25, 2012
Imprint: Wiley
Language: English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

More books from Wiley

Cover of the book The Wiley-Blackwell Handbook of Addiction Psychopharmacology by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Tectonics of Sedimentary Basins by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Foreclosure Investing For Dummies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book My Life in Leadership by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Harmonic Elliott Wave by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Water Wells and Boreholes by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Escape From Debt by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Functional Programming in C# by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Enterprise Interoperability by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Bioinorganic Medicinal Chemistry by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Statistical Methods for Hospital Monitoring with R by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Structural Health Monitoring by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Thermal Ionization Mass Spectrometry (TIMS) by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Handbook of Applied Dog Behavior and Training, Procedures and Protocols by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Mauerwerk Kalender 2019 by Shuangbao Paul Wang, Robert S. Ledley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy