|
|
|||
|
||||
OverviewIn this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organised around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract students' attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust. Full Product DetailsAuthor: Charles Pfleeger , Shari Pfleeger , Shari PfleegerPublisher: Pearson Education (US) Imprint: Pearson Edition: United States ed of 1st ed Dimensions: Width: 18.30cm , Height: 3.30cm , Length: 23.90cm Weight: 1.190kg ISBN: 9780132789462ISBN 10: 0132789469 Pages: 848 Publication Date: 27 January 2012 Audience: Adult education , Further / Higher Education Replaced By: 9780132839402 Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsChapter 1: Security Blanket or Security Theater? Chapter 2: Knock, Knock. Who’s There? Chapter 3: 2 + 2 = 5 Chapter 4: A Horse of a Different Color Chapter 5: The Keys to the Kingdom Chapter 6: My Cup Runneth Over Chapter 7: He Who Steals My Purse . . . Chapter 8: The Root of All Evil Chapter 9: Scanning the Horizon Chapter 10: Do You Hear What I Hear? Chapter 11: I Hear You Loud and Clear Chapter 12: Disregard That Man Behind the Curtain Chapter 13: Not All Is as It Seems Chapter 14: Play It [Again] Sam, or, Let’s Look at the Instant Replay Chapter 15: I Can’t Get No Satisfaction Chapter 16: ’Twas Brillig, and the Slithy Toves . . . Chapter 17: Peering through the Window 676 Chapter 18: My 100,000 Nearest and Dearest Friends AfterwordReviewsThis is a must-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book. -John Hughes, InfoSec Reviews Author InformationDr. Charles P. Pfleeger, an independent computer and information security consultant, provides threat/vulnerability analysis, design review, training, expert testimony, and security advice to clients worldwide. He was master security architect at Cable and Wireless and Exodus Communications, and professor of computer science at the University of Tennessee. Dr. Pfleeger is coauthor of Security in Computing, Fourth Edition (Prentice Hall, 2007), today’s leading college computer security textbook. Dr. Shari Lawrence Pfleeger is Director of Research for the Institute for Information Infrastructure Protection at Dartmouth College, a consortium working to protect the U.S. cyber infrastructure. The Journal of Systems and Software has repeatedly named her one of the world’s top software engineering researchers. Dr. Pfleeger is coauthor of Security in Computing, Fourth Edition (Prentice Hall, 2007), today’s leading college computer security textbook. Tab Content 6Author Website:Countries AvailableAll regions |