Description:""In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.""--Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures "Analyzing Computer Security "is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic "Security in Computing"--teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includesUnderstanding threats, vulnerabilities, and countermeasuresKnowing when security is useful, and when it's useless "security theater"Implementing effective identification and authentication systemsUsing modern cryptography and overcoming weaknesses in cryptographic systemsProtecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and moreUnderstanding, preventing, and mitigating DOS and DDOS attacksArchitecting more secure wired and wireless networksBuilding more secure application software and operating systems through more solid designs and layered protectionProtecting identities and enforcing privacyAddressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social mediaWe have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. To get started finding Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach, you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.
Pages
—
Format
PDF, EPUB & Kindle Edition
Publisher
—
Release
—
ISBN
0132789469
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Description: ""In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.""--Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures "Analyzing Computer Security "is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic "Security in Computing"--teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includesUnderstanding threats, vulnerabilities, and countermeasuresKnowing when security is useful, and when it's useless "security theater"Implementing effective identification and authentication systemsUsing modern cryptography and overcoming weaknesses in cryptographic systemsProtecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and moreUnderstanding, preventing, and mitigating DOS and DDOS attacksArchitecting more secure wired and wireless networksBuilding more secure application software and operating systems through more solid designs and layered protectionProtecting identities and enforcing privacyAddressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social mediaWe have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. To get started finding Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach, you are right to find our website which has a comprehensive collection of manuals listed. Our library is the biggest of these that have literally hundreds of thousands of different products represented.