Analyzing Computer Security : A Threat / Vulnerability / Countermeasure Approach Charles P. Pfleeger
Material type: TextLanguage: Eng. Publication details: Pearson New Delhi 2014Edition: 1st EdDescription: 795p. 20.3 x 25.4 x 4.7 cmISBN:- 9789332517424
- 005.8 PFL
Item type | Current library | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | Rashtriya Raksha University | 005.8 PFL (Browse shelf(Opens below)) | Available | 5357 | |||
Books | Rashtriya Raksha University | 005.8 PFL (Browse shelf(Opens below)) | Available | 5358 | |||
Books | Rashtriya Raksha University | 005.8 PFL (Browse shelf(Opens below)) | Available | 5359 | |||
Books | Rashtriya Raksha University | 005.8 PFL (Browse shelf(Opens below)) | Available | 5360 | |||
Books | Rashtriya Raksha University | 005.8 PFL (Browse shelf(Opens below)) | Available | 5292 |
Browsing Rashtriya Raksha University shelves Close shelf browser (Hides shelf browser)
In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis economics and quantitative study privacy, ethics and laws and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors and trust.
There are no comments on this title.