0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach (Hardcover, United States ed of 1st ed) Price: R3,175
Discovery Miles 31 750
Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach (Hardcover, United States ed of 1st ed):...

Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach (Hardcover, United States ed of 1st ed)

Charles Pfleeger, Shari Pfleeger

 (sign in to rate)
Price R3,175
Sold by
Aristata Bookshop - Fulfilled by Loot
Discovery Miles 31 750 | Repayment Terms: R298 pm x 12*

Bookmark and Share

Expected to ship within 4 - 6 working days

""In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.""--Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures "Analyzing Computer Security "is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic "Security in Computing"--teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes
  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it's useless "security theater"
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

General

Imprint: Pearson
Country of origin: United States
Release date: August 2011
First published: 2012
Authors: Charles Pfleeger • Shari Pfleeger
Dimensions: 238 x 183 x 32mm (L x W x T)
Format: Hardcover
Pages: 848
Edition: United States ed of 1st ed
ISBN-13: 978-0-13-278946-2
Categories: Books > Computing & IT > Computer communications & networking > Network security
Promotions
LSN: 0-13-278946-9
Barcode: 9780132789462

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,797 Discovery Miles 67 970

See more

Partners