Computer Architecture and Security

Fundamentals of Designing Secure Computer Systems

Nonfiction, Computers, Advanced Computing, Engineering, Computer Engineering
Cover of the book Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shuangbao Paul Wang, Robert S. Ledley ISBN: 9781118168837
Publisher: Wiley Publication: October 25, 2012
Imprint: Wiley Language: English
Author: Shuangbao Paul Wang, Robert S. Ledley
ISBN: 9781118168837
Publisher: Wiley
Publication: October 25, 2012
Imprint: Wiley
Language: English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

More books from Wiley

Cover of the book Designing and Assessing Courses and Curricula by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book ITIL Intermediate Certification Companion Study Guide by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Linux Command Line and Shell Scripting Bible by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Peptidomimetics in Organic and Medicinal Chemistry by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Fine Art and High Finance by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book A Companion to the Archaeology of Religion in the Ancient World by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Using Wikis for Online Collaboration by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Data Driven Business Transformation by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Listening Publics by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Essentials of Inorganic Chemistry by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book I Hate Presentations by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Borderline Personality Disorder For Dummies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Film Theory by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Mechatronics by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Web Marketing All-in-One For Dummies by Shuangbao Paul Wang, Robert S. Ledley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy