- Home
- Computers
- Networking
- Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
List Price:
$73.00
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
O. Sami Saydjari
Format:
Paperback
Publisher:
McGraw Hill LLC (July 26, 2018)
Audience:
General/trade
ISBN-13:
9781260118179
ISBN-10:
1260118177
Weight:
35.36oz
Dimensions:
7.3" x 9" x 1.1"
Case Pack:
16
File:
McGrawHill-MH_ONIX_V30_US_onix30_delta(26_04_14)-20260414.xml
Folder:
McGrawHill
List Price:
$73.00
As low as:
$56.21
Publisher Identifier:
P-MCGRAW
Discount Code:
B
Pages:
592
Pub Discount:
55
Imprint:
McGraw Hill
Overview
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.
Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including:
• Defining the fundamental nature and full breadth of the cybersecurity problem
• Adopting an essential perspective that considers attacks, failures, and attacker mindsets
• Developing and implementing risk-mitigating, systems-based solutions
• Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time showcases 35 years of practical engineering experience from an expert whose persuasive vision has advanced national cybersecurity policy and practices.
Readers of this book will be prepared to navigate the tumultuous and uncertain future of cyberspace and move the cybersecurity discipline forward by adopting timeless engineering principles, including:
• Defining the fundamental nature and full breadth of the cybersecurity problem
• Adopting an essential perspective that considers attacks, failures, and attacker mindsets
• Developing and implementing risk-mitigating, systems-based solutions
• Transforming sound cybersecurity principles into effective architecture and evaluation strategies that holistically address the entire complex attack space








