Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

  • ISBN13:


  • ISBN10:


  • Edition: 1st
  • Format: Paperback
  • Copyright: 2018-07-26
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00 Save up to $9.00
  • Rent Book $54.00
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Table of Contents

PART 1: What Do You Want?
Chapter 1: What's the Problem?
Chapter 2: Cybersecurity Right-Think
Chapter 3: Value and Mission: Know Thyself
Chapter 4: Harm: Mission in Peril
Chapter 5: Approximating Reality

PART 2: What Could Go Wrong?
Chapter 6: Adversaries: Know Thy Enemy
Chapter 7: Forests of Attack Trees

PART 3: What Are the Building Blocks of Mitigating Risk?
Chapter 8: Countermeasures -- Security Controls
Chapter 9: Trustworthy Hardware -- Bedrock
Chapter 10: Cryptography -- A Sharp Tool
Chapter 11: Authentication
Chapter 12: Authorization
Chapter 13: Detection Foundation
Chapter 14: Detection Systems
Chapter 15: Detection Strategy
Chapter 16: Deterrence and Adversarial Risk

PART 4: How Do You Orchestrate Cybersecurity?
17: Cybersecurity Risk Assessment
Chapter 18: Risk Mitigation and Optimization
Chapter 19: Engineering Fundamentals
Chapter 20: Architecting Cybersecurity
Chapter 21: Assuring Cybersecurity: Getting it Right
Chapter 22: Cyber Situation Understanding: What's Going On
Chapter 23: Command and Control: What to Do About Attack

PART 5: Moving Cybersecurity Forward
Chapter 24: Strategy Policy and Investment
Chapter 25: The Future of Cybersecurity

PART 6: Appendices
App A: Resources

Rewards Program

Write a Review