Analyzing computer security : a threat/vulnerability/countermeasure approach
Material type: TextPublication details: Noida Pearson 2014Description: 795 pISBN: 9789332517424Subject(s): Computer security | Data protectionDDC classification: 005.8 Summary: Description In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present todays most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, buildingItem type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
BK | Stack | Stack | 005.8 PFL/A (Browse shelf (Opens below)) | Available | 59764 |
Browsing Kannur University Central Library shelves, Shelving location: Stack, Collection: Stack Close shelf browser (Hides shelf browser)
005.8 LIU/F Firewall design and analysis | 005.8 NEL/G Guide to computer forensics and investigations | 005.8 OTT/S Securing the virtual environment: How to defend the enterprise against attack | 005.8 PFL/A Analyzing computer security : a threat/vulnerability/countermeasure approach | 005.8 PFL/S Security in computing | 005.8 PFL/S Security in computing | 005.8 SIN/C Cybersecurity and cyberwar : what everyone needs to know |
Description In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present todays most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building
There are no comments on this title.