Computer Architecture and Organization: Fundamentals and Architecture Security

· Springer Nature
3.0
1 āŠ°āŠŋāŠĩāŦāŠŊāŦ‚
āŠ‡-āŠŠāŦāŠļāŦāŠĪāŠ•
337
āŠŠāŦ‡āМ

āŠ† āŠ‡-āŠŠāŦāŠļāŦāŠĪāŠ• āŠĩāŠŋāŠķāŦ‡

In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks.

Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author’s recent award-winning teaching and research.

The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development.

The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.


āŠ°āŦ‡āПāŠŋāŠ‚āŠ— āŠ…āŠĻāŦ‡ āŠ°āŠŋāŠĩāŦāŠŊāŦ‚

3.0
1 āŠ°āŠŋāŠĩāŦāŠŊāŦ‚

āŠēāŦ‡āŠ–āŠ• āŠĩāŠŋāŠķāŦ‡

Paul Wang is a Professor and Chairperson of Computer Science at Morgan State University. He is a LINK Fellow and has held positions as the TSYS Endowed Chair in Cybersecurity with a $5 million endorsement, Director of the Center for Security Studies with more than 3,000 cyber students, and Chief Information and Technology Officer (CIO/CTO) of the National Biomedical Research Foundation. He has been a consultant to many companies and served on multiple boards and government and private sector technology committees. He was directly involved in drafting the National Initiatives of Cybersecurity Education (NICE) framework. His research areas include quantum computing, secure architecture, AI/ML, cybersecurity, and video indexing.

In addition to books, refereed publications, conference keynotes and numerous grant-related activities including recent grants from the NSF, NSA, Apple, and Microsoft, Paul holds four patents, three of which have been licensed to the industry. Paul Wang received his Ph.D. under Dr. Robert Ledley, the inventor of the body CT scanner, in 2004. He completed his postdoctoral studies in quantum computing at MIT and in data science at the University of Cambridge.


āŠ† āŠ‡-āŠŠāŦāŠļāŦāŠĪāŠ•āŠĻāŦ‡ āŠ°āŦ‡āПāŠŋāŠ‚āŠ— āŠ†āŠŠāŦ‹

āŠĪāŠŪāŦ‡ āŠķāŦāŠ‚ āŠĩāŠŋāŠšāŠūāŠ°āŦ‹ āŠ›āŦ‹ āŠ…āŠŪāŠĻāŦ‡ āŠœāŠĢāŠūāŠĩāŦ‹.

āŠŪāŠūāŠđāŠŋāŠĪāŦ€ āŠĩāŠūāŠ‚āŠšāŠĩāŦ€

āŠļāŦāŠŪāŠūāŠ°āŦāПāŠŦāŦ‹āŠĻ āŠ…āŠĻāŦ‡ āŠŸāŦ…āŠŽāŦāŠēāŦ‡āП
Android āŠ…āŠĻāŦ‡ iPad/iPhone āŠŪāŠūāŠŸāŦ‡ Google Play Books āŠāŠŠ āŠ‡āŠĻāŦāŠļāŦāПāŦ‰āŠē āŠ•āŠ°āŦ‹. āŠĪāŦ‡ āŠĪāŠŪāŠūāŠ°āŠū āŠāŠ•āŠūāŠ‰āŠĻāŦāП āŠļāŠūāŠĨāŦ‡ āŠ‘āŠŸāŦ‹āŠŪāŦ…āПāŠŋāŠ• āŠ°āŦ€āŠĪāŦ‡ āŠļāŠŋāŠ‚āŠ• āŠĨāŠūāŠŊ āŠ›āŦ‡ āŠ…āŠĻāŦ‡ āŠĪāŠŪāŠĻāŦ‡ āŠœāŦāŠŊāŠūāŠ‚ āŠŠāŠĢ āŠđāŦ‹ āŠĪāŦāŠŊāŠūāŠ‚ āŠĪāŠŪāŠĻāŦ‡ āŠ‘āŠĻāŠēāŠūāŠ‡āŠĻ āŠ…āŠĨāŠĩāŠū āŠ‘āŠŦāŠēāŠūāŠ‡āŠĻ āŠĩāŠūāŠ‚āŠšāŠĩāŠūāŠĻāŦ€ āŠŪāŠ‚āŠœāŦ‚āаāŦ€ āŠ†āŠŠāŦ‡ āŠ›āŦ‡.
āŠēāŦ…āŠŠāŠŸāŦ‰āŠŠ āŠ…āŠĻāŦ‡ āŠ•āŠŪāŦāŠŠāŦāŠŊāŦāŠŸāŠ°
Google Play āŠŠāŠ° āŠ–āŠ°āŦ€āŠĶāŦ‡āŠē āŠ‘āŠĄāŠŋāŠ“āŠŽāŦāŠ•āŠĻāŦ‡ āŠĪāŠŪāŦ‡ āŠĪāŠŪāŠūāŠ°āŠū āŠ•āŠŪāŦāŠŠāŦāŠŊāŦāŠŸāŠ°āŠĻāŠū āŠĩāŦ‡āŠŽ āŠŽāŦāаāŠūāŠ‰āŠāŠ°āŠĻāŦ‹ āŠ‰āŠŠāŠŊāŦ‹āŠ— āŠ•āŠ°āŦ€āŠĻāŦ‡ āŠļāŠūāŠ‚āŠ­āŠģāŦ€ āŠķāŠ•āŦ‹ āŠ›āŦ‹.
eReaders āŠ…āŠĻāŦ‡ āŠ…āŠĻāŦāŠŊ āŠĄāŠŋāŠĩāŠūāŠ‡āŠļ
Kobo āŠ‡-āŠ°āŦ€āŠĄāŠ° āŠœāŦ‡āŠĩāŠū āŠ‡-āŠ‡āŠ‚āŠ• āŠĄāŠŋāŠĩāŠūāŠ‡āŠļ āŠŠāŠ° āŠĩāŠūāŠ‚āŠšāŠĩāŠū āŠŪāŠūāŠŸāŦ‡, āŠĪāŠŪāŠūāŠ°āŦ‡ āŠŦāŠūāŠ‡āŠēāŠĻāŦ‡ āŠĄāŠūāŠ‰āŠĻāŠēāŦ‹āŠĄ āŠ•āŠ°āŦ€āŠĻāŦ‡ āŠĪāŠŪāŠūāŠ°āŠū āŠĄāŠŋāŠĩāŠūāŠ‡āŠļ āŠŠāŠ° āŠŸāŦāаāŠūāŠĻāŦāŠļāŠŦāŠ° āŠ•āŠ°āŠĩāŠūāŠĻāŦ€ āŠœāŠ°āŦ‚āа āŠŠāŠĄāŠķāŦ‡. āŠļāŠŠāŦ‹āаāŦāПāŦ‡āŠĄ āŠ‡-āŠ°āŦ€āŠĄāŠ° āŠŠāŠ° āŠŦāŠūāŠ‡āŠēāŦ‹ āŠŸāŦāаāŠūāŠĻāŦāŠļāŦāŠŦāŠ° āŠ•āŠ°āŠĩāŠū āŠŪāŠūāŠŸāŦ‡ āŠļāŠđāŠūāŠŊāŠĪāŠū āŠ•āŦ‡āŠĻāŦāŠĶāŦāаāŠĻāŦ€ āŠĩāŠŋāŠ—āŠĪāŠĩāŠūāŠ° āŠļāŦ‚āКāŠĻāŠūāŠ“ āŠ…āŠĻāŦāŠļāŠ°āŦ‹.