Image
EAN-139780132789462   EAN-13 barcode 9780132789462
Product NameAnalyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
LanguageEnglish
CategoryBook / Magazine / Publication
Short DescriptionHeight:9.41 inches / Length:7.2 inches / Weight:2.63 pounds / Width:1.3 inches
Amazon.comA Buy on Amazon ~ 0132789469
SKUACOM-INT_BOOK_USEDLIKENEW_0132789469
Price New79.99 US Dollars    (curriencies)
Price Used51.97 US Dollars    (curriencies)
Width1.2 inches    (convert)
Height9 inches    (convert)
Length6.8 inches    (convert)
Weight45.6 ounces    (convert)
AuthorCharles P. Pfleeger, Shari Lawrence Pfleeger
Page Count896
BindingHardcover
Published09/04/2011
Long Description“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.” —Charles C. Palmer, IBM Research  The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing —teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes  Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it’s useless “security theater” Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media
Similar Items9780895263841: Cyber War: The Next Threat To National Security And What To Do About It
9780865318342: Cyber War: The Next Threat To National Security And What To Do About It
9780844247465: Cyber War: The Next Threat To National Security And What To Do About It
9780844247243: Cyber War: The Next Threat To National Security And What To Do About It
9780737739251: Cyber War: The Next Threat To National Security And What To Do About It
9780737737622: Cyber War: The Next Threat To National Security And What To Do About It
9780737737615: Cyber War: The Next Threat To National Security And What To Do About It
9780061962240: Cyber War: The Next Threat To National Security And What To Do About It
9780131019898: Security In Computing, 4th Edition
9780137989430: Security In Computing
View 35 more similar items
Created01-19-2013 7:51:38pm
Modified04-30-2020 3:51:04pm
MD584f1c1e8aa2ec2723ca7c3fd2db25f5a
SHA2564b782750621868fd102823a0f321ee215861446f71081f37d157db82475efaa9
Search Googleby EAN or by Title
Query Time0.0197520

Article of interest

We just completed a major upgrade to the backend with a minor face lift to the web site. More changes are coming soon!

We completed the upgrade that changed the way we store company data and connect it to the product details. This required a set major database changes and some minor but important web site changes.

Over the next couple weeks we will roll out various other web site upgrades that make use of these new changes and provide you with better access to our data.

As always, if you see anything odd on the site, please let us know and we will get it fixed right away.

Close

Search

Close

Share