Analyzing computer security : a threat/vulnerability/countermeasure approach

By: Pfleeger, Charles PContributor(s): Pfleeger, Shari LawrenceMaterial type: TextTextPublication details: Noida Pearson 2014Description: 795 pISBN: 9789332517424Subject(s): Computer security | Data protectionDDC classification: 005.8 Summary: Description In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present todays most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Status Date due Barcode
BK BK
Stack
Stack 005.8 PFL/A (Browse shelf (Opens below)) Available 59764

Description In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present todays most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building

There are no comments on this title.

to post a comment.

Powered by Koha