Computer Architecture and Security

Fundamentals of Designing Secure Computer Systems

Nonfiction, Computers, Advanced Computing, Engineering, Computer Engineering
Cover of the book Computer Architecture and Security by Shuangbao Paul Wang, Robert S. Ledley, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Shuangbao Paul Wang, Robert S. Ledley ISBN: 9781118168837
Publisher: Wiley Publication: October 25, 2012
Imprint: Wiley Language: English
Author: Shuangbao Paul Wang, Robert S. Ledley
ISBN: 9781118168837
Publisher: Wiley
Publication: October 25, 2012
Imprint: Wiley
Language: English

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

  • Examination of memory, CPU architecture and system implementation
  • Discussion of computer buses and a dual-port bus interface
  • Examples cover a board spectrum of hardware and software systems
  • Design and implementation of a patent-pending secure computer system
  • Includes the latest patent-pending technologies in architecture security
  • Placement of computers in a security fulfilled network environment
  • Co-authored by the inventor of the modern Computed Tomography (CT) scanner
  • Provides website for lecture notes, security tools and latest updates
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems

This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.

More books from Wiley

Cover of the book A Continental Plate Boundary by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book How To Sell When Nobody's Buying by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Kinematic Analysis of Human Movement by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Physikalische Chemie by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Organic Crop Breeding by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book A Beautiful Constraint by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Urology by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Israel / Palestine by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book An Introduction to Essential Algebraic Structures by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Education Nation by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Assessing Organizational Performance in Higher Education by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Neuro-Linguistisches Programmieren für Dummies by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Fundamentals of Enzyme Kinetics by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book HR for Small Business For Dummies - UK by Shuangbao Paul Wang, Robert S. Ledley
Cover of the book Investment Performance Measurement by Shuangbao Paul Wang, Robert S. Ledley
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy