Your cart is empty
Showing 1 - 1 of 1 matches in All departments
""I believe" The Craft of System Security "is one of the best
software security books on the market today. It has not only
breadth, but depth, covering topics ranging from cryptography,
networking, and operating systems--to the Web, computer-human
interaction, and how to improve the security of software systems by
improving hardware. Bottom line, this book should be required
reading for all who plan to call themselves security practitioners,
and an invaluable part of every university's computer science
""Here's to a fun, exciting read: a unique book chock-full of
practical examples of the uses and the misuses of computer
security. I expect that it will motivate a good number of college
students to want to learn more about the field, at the same time
that it will satisfy the more experienced professional.""
Whether you're a security practitioner, developer, manager, or administrator, this book will give you the deep understanding necessary to meet today's security challenges--and anticipate tomorrow's. Unlike most books, "The Craft of System Security" doesn't just review the modern security practitioner's toolkit: It explains why each tool exists, and discusses how to use it to solve real problems.
After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding today's systems and vulnerabilities. Next, they systematically introduce thebasic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security.
After reading this book, you will be able toUnderstand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and SolarisLearn how networking, the Web, and wireless technologies affect securityIdentify software security defects, from buffer overflows to development process flawsUnderstand cryptographic primitives and their use in secure systemsUse best practice techniques for authenticating people and computer systems in diverse settingsUse validation, standards, and testing to enhance confidence in a system's securityDiscover the security, privacy, and trust issues arising from desktop productivity toolsUnderstand digital rights management, watermarking, information hiding, and policy expressionLearn principles of human-computer interaction (HCI) design for improved securityUnderstand the potential of emerging work in hardware-based security and trusted computing
You may like...
Barbra Streisand CD (2)
R49 Discovery Miles 490
Nadine Gordimer Paperback (2)
Reebok Water Bottle - 500ml - Blue/White
Bestway Hydro Swim Protector Set…
Maped I-Gloo 1-Hole Mini Sharpener
R10 Discovery Miles 100
Maped Color'Peps Maxi Pencil Crayons…
R71 Discovery Miles 710
JJ Cole Linden Stone Arbor Diaper Bag
Casio LW-200-7AV Watch with 10-Year…
Badgirl Wanderer Ladies Sunglasses