Computer Architecture and Security

Fundamentals of Designing Secure Computer Systems

Nonfiction, Computers, Advanced Computing, Engineering, Computer Engineering
Cover of the book Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shuangbao Paul Wang, Robert S. Ledley ISBN: 9781118168837
Publisher: Wiley Publication: October 25, 2012
Imprint: Wiley Language: English
Author: Shuangbao Paul Wang, Robert S. Ledley
ISBN: 9781118168837
Publisher: Wiley
Publication: October 25, 2012
Imprint: Wiley
Language: English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

More books from Wiley

Cover of the book YouTube For Dummies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Plant Gene Containment by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Taming the Bear by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Effective Teams by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Real Estate Finance in the New Economy by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Thermochemical Processing of Biomass by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book The Hollywood Action and Adventure Film by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Person-Centered Recovery Planner for Adults with Serious Mental Illness by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Governing the Present by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book PMP Project Management Professional Practice Tests by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Grief Counseling Homework Planner by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Thriving in Childhood and Adolescence: The Role of Self Regulation Processes by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Nowhere to Hide by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Shares Made Simple by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Beyond Foundations by Shuangbao Paul Wang, Robert S. Ledley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy