Comp Arch Security C

Besorgungstitel - wird vorgemerkt | Lieferzeit: Besorgungstitel - Lieferbar innerhalb von 10 Werktagen I
Alle Preise inkl. MwSt. | Versandkostenfrei
Nicht verfügbar Zum Merkzettel
Gewicht:
672 g
Format:
251x172x22 mm
Beschreibung:

Shuangbao (Paul) Wang is the inventor of a secure computer system. He is the recipient of Link Fellowship Award in advanced simulation and training. He holds four patents; three of them have been transferred into industry and put into production. One of his students appeared in Time Magazine for doing his class project which he commercialized and still pursues. In addition, one of his published papers ranked the first place in Science Direct's TOP 25 Hottest Articles. His research was awarded the Best Invention Award in Entrepreneurship Week USA at Mason. More recently, he received two University Technology Transfer Awards.
 
Dr. Wang has extensive experience in academia, industry, and public services. He has held many posts, including professor, director, CEO, CIO/CTO and ranking positions in public services. He is currently a professor at George Mason University. Dr. Wang served as the Chief Information and Technology Officer at National Biomedical Research Foundation (USA)/Georgetown University Medical Center. Earlier, he was the director of the Institute of Information Science and Technology at Qingdao (ISTIQ) where he oversaw more than 120 faculty and staff, acquired 12 grants, won 18 academic awards and was the PI for over 15 grants/projects.
 
Robert S. Ledley is the inventor of CT scanner and is a member of the National Academy of Science (USA). He has numerous publications in Science and several books, and has hundreds of patents and grants. Dr. Ledley is the recipient of the National Medal of Technology (USA) that was awarded to him by President Clinton in 1997. He was admitted to the National Inventors Hall of Fame in 1990.
 
Dr. Ledley has been the president of the National Biomedical Research Foundation (USA) since 1960. He is also a professor (emeritus) at Georgetown University. Dr. Ledley is the editor-in-chief of four international journals. He has testified before the House and was interviewed by the Smithsonian Institution.
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems
This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective.
About the Authors xv
 
Preface xvii
 
Acknowledgements xix
 
1 Introduction to Computer Architecture and Security 1
 
1.1 History of Computer Systems 3
 
1.1.1 Timeline of Computer History 5
 
1.1.2 Timeline of Internet History 15
 
1.1.3 Timeline of Computer Security History 28
 
1.2 John von Neumann Computer Architecture 34
 
1.3 Memory and Storage 36
 
1.4 Input/Output and Network Interface 37
 
1.5 Single CPU and Multiple CPU Systems 38
 
1.6 Overview of Computer Security 41
 
1.6.1 Confidentiality 41
 
1.6.2 Integrity 42
 
1.6.3 Availability 42
 
1.6.4 Threats 43
 
1.6.5 Firewalls 43
 
1.6.6 Hacking and Attacks 44
 
1.7 Security Problems in Neumann Architecture 46
 
1.8 Summary 48
 
Exercises 48
 
References 50
 
2 Digital Logic Design 51
 
2.1 Concept of Logic Unit 51
 
2.2 Logic Functions and Truth Tables 52
 
2.3 Boolean Algebra 54
 
2.4 Logic Circuit Design Process 55
 
2.5 Gates and Flip-Flops 56
 
2.6 Hardware Security 58
 
2.7 FPGA and VLSI 58
 
2.7.1 Design of an FPGA Biometric Security System 59
 
2.7.2 A RIFD Student Attendance System 59
 
2.8 Summary 65
 
Exercises 67
 
References 67
 
3 Computer Memory and Storage 68
 
3.1 A One Bit Memory Circuit 68
 
3.2 Register, MAR, MDR and Main Memory 70
 
3.3 Cache Memory 72
 
3.4 Virtual Memory 74
 
3.4.1 Paged Virtual Memory 74
 
3.4.2 Segmented Virtual Memory 74
 
3.5 Non-Volatile Memory 76
 
3.6 External Memory 77
 
3.6.1 Hard Disk Drives 78
 
3.6.2 Tertiary Storage and Off-Line Storage 78
 
3.6.3 Serial Advanced Technology Attachment (SATA) 79
 
3.6.4 Small Computer System Interface (SCSI) 80
 
3.6.5 Serial Attached SCSI (SAS) 81
 
3.6.6 Network-Attached Storage (NAS) 82
 
3.6.7 Storage Area Network (SAN) 83
 
3.6.8 Cloud Storage 85
 
3.7 Memory Access Security 86
 
3.8 Summary 88
 
Exercises 89
 
References 89
 
4 Bus and Interconnection 90
 
4.1 System Bus 90
 
4.1.1 Address Bus 91
 
4.1.2 Data Bus 93
 
4.1.3 Control Bus 93
 
4.2 Parallel Bus and Serial Bus 95
 
4.2.1 Parallel Buses and Parallel Communication 95
 
4.2.2 Serial Bus and Serial Communication 96
 
4.3 Synchronous Bus and Asynchronous Bus 107
 
4.4 Single Bus and Multiple Buses 109
 
4.5 Interconnection Buses 110
 
4.6 Security Considerations for Computer Buses 111
 
4.7 A Dual-Bus Interface Design 112
 
4.7.1 Dual-Channel Architecture 113
 
4.7.2 Triple-Channel Architecture 114
 
4.7.3 A Dual-Bus Memory Interface 115
 
4.8 Summary 115
 
Exercises 117
 
References 117
 
5 I/O and Network Interface 118
 
5.1 Direct Memory Access 118
 
5.2 Interrupts 120
 
5.3 Programmed I/O 121
 
5.4 USB and IEEE 1394 122
 
5.4.1 USB Advantages 123
 
5.4.2 USB Architecture 123
 
5.4.3 USB Version History 124
 
5.4.4 USB Design and Architecture 125
 
5.4.5 USB Mass Storage 127
 
5.4.6 USB Interface Connectors 128
 
5.4.7 USB Connector Types 130
 
5.4.8 USB Power and Charging 133
 
5.4.9 IEEE 1394 136
 
5.5 Network Interface Card 136
 
5.5.1 Basic NIC Architecture 137
 
5.5.2 Data Transmission 138
 
5.6 Keyboard, Vide
Lieferung vom Verlag mit leichten Qualitätsmängeln möglich
The first book to introduce computer architecture for security and provide the tools to implement secure computer systems
 
This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace.
* Examination of memory, CPU architecture and system implementation
* Discussion of computer buses and a dual-port bus interface
* Examples cover a board spectrum of hardware and software systems
* Design and implementation of a patent-pending secure computer system
* Includes the latest patent-pending technologies in architecture security
* Placement of computers in a security fulfilled network environment
* Co-authored by the inventor of the modern Computed Tomography (CT) scanner
* Provides website for lecture notes, security tools and latest updates

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.