Your cart is empty
Showing 1 - 1 of 1 matches in All departments
""I believe" The Craft of System Security "is one of the best
software security books on the market today. It has not only
breadth, but depth, covering topics ranging from cryptography,
networking, and operating systems--to the Web, computer-human
interaction, and how to improve the security of software systems by
improving hardware. Bottom line, this book should be required
reading for all who plan to call themselves security practitioners,
and an invaluable part of every university's computer science
""Here's to a fun, exciting read: a unique book chock-full of
practical examples of the uses and the misuses of computer
security. I expect that it will motivate a good number of college
students to want to learn more about the field, at the same time
that it will satisfy the more experienced professional.""
Whether you're a security practitioner, developer, manager, or administrator, this book will give you the deep understanding necessary to meet today's security challenges--and anticipate tomorrow's. Unlike most books, "The Craft of System Security" doesn't just review the modern security practitioner's toolkit: It explains why each tool exists, and discusses how to use it to solve real problems.
After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding today's systems and vulnerabilities. Next, they systematically introduce thebasic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security.
After reading this book, you will be able toUnderstand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and SolarisLearn how networking, the Web, and wireless technologies affect securityIdentify software security defects, from buffer overflows to development process flawsUnderstand cryptographic primitives and their use in secure systemsUse best practice techniques for authenticating people and computer systems in diverse settingsUse validation, standards, and testing to enhance confidence in a system's securityDiscover the security, privacy, and trust issues arising from desktop productivity toolsUnderstand digital rights management, watermarking, information hiding, and policy expressionLearn principles of human-computer interaction (HCI) design for improved securityUnderstand the potential of emerging work in hardware-based security and trusted computing
You may like...
Wynie - My Bloed Is Blou
Wynie Strydom, Alita Steenkamp Paperback (1)
Canon PG-445XL High-Yield Inkjet…
Ultra Link Premium Wireless Optical…
Romoss OM10 10000mAh Power Bank (White)
Venta Airwasher Fragrance Aromatherapy…
Voel Jy Die Genade
Jo Black CD
Nadine Gordimer Paperback (2)
Nadine Gordimer Paperback (2)
Ryan Reynolds, Justice Smith, … DVD
Bestway Hydro-Force Accelera Goggles…