𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

✍ Scribed by Charles P. Pfleeger, Shari Lawrence Pfleeger


Publisher
Prentice Hall
Year
2011
Tongue
English
Leaves
842
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer securityβ€”so you can prevent serious problems and mitigate the effects of those that still occur.
Coverage includes
Understanding threats, vulnerabilities, and countermeasures
Knowing when security is useful, and when it’s useless β€œsecurity theater”
Implementing effective identification and authentication systems
Using modern cryptography and overcoming weaknesses in cryptographic systems
Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
Understanding, preventing, and mitigating DOS and DDOS attacks
Architecting more secure wired and wireless networks
Building more secure application software and operating systems through more solid designs and layered protection
Protecting identities and enforcing privacy
Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

✦ Subjects


Internet Groupware Telecommunications Networking Cloud Computing Computers Technology Network Security Privacy Online Safety Encryption Reference Almanacs Yearbooks Atlases Maps Careers Catalogs Directories Consumer Guides Dictionaries Thesauruses Encyclopedias Subject English as a Second Language Etiquette Foreign Study Genealogy Quotations Survival Emergency Preparedness Test Preparation Words Grammar Writing Research Publishing Computer Science New Used Rental Textbooks Specialty Boutique


πŸ“œ SIMILAR VOLUMES


Securing VoIP Networks: Threats, Vulnera
✍ Peter Thermos, Ari Takanen πŸ“‚ Library πŸ“… 2007 πŸ› Addison-Wesley Professional 🌐 English

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspec

Improving Web Application Security: Thre
✍ Microsoft Corporation πŸ“‚ Library πŸ“… 2003 πŸ› Microsoft Press 🌐 English

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, a

Microsoft. 2007 Microsoft Office Securit
πŸ“‚ Library 🌐 English

Version<br/>1.0. β€” Microsoft.com, 2007. β€” 265 p.<br/>(Автор Π½Π΅ ΡƒΠΊΠ°Π·Π°Π½).<div class="bb-sep"></div>This guide is a component of the 2007 Microsoft Office Security Guide. It provides detailed vulnerability, countermeasure, and impact information about security-related Group Policy settings for the 2007

Bioterrorism, Threat Analytics and Secur
✍ Sumit Chakraborty πŸ“‚ Library πŸ“… 2013 πŸ› Business Analytics Research Lab India 🌐 English

Abstract: This work defines the security intelligence of a system based on secure multiparty computation in terms of correctness, fairness, trust, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identifi

The Privacy Handbook: Proven Countermeas
✍ Michael E. Chesbro πŸ“‚ Library πŸ“… 2002 πŸ› Paladin Press 🌐 English

"Those who would give up essential liberty to purchase safety," stated Benjamin Franklin in 1759, "deserve neither liberty nor safety." Unfortunately, in today's climate of fear, the government, the media and plenty of other American citizens see things differently. If you are not willing to accept

Treating Vulnerable Populations of Cance
✍ Tanya R. Fitzpatrick (eds.) πŸ“‚ Library πŸ“… 2016 πŸ› Springer International Publishing 🌐 English

<p>This competence-building resource synthesizes a rich trove of conceptual and practical information on treating cancer survivors at risk of being underserved. Spotlighting a diverse group of ethnic and other demographic populations surviving diverse forms of cancer, the book models the assessing o