Free Worldwide Shipping on Orders $50+
Shopping Cart
Computer Security Analysis: Threat, Vulnerability & Countermeasure Guide | Cybersecurity Solutions for Businesses & IT Professionals
$77.67
$103.57
Safe 25%
Computer Security Analysis: Threat, Vulnerability & Countermeasure Guide | Cybersecurity Solutions for Businesses & IT Professionals
Computer Security Analysis: Threat, Vulnerability & Countermeasure Guide | Cybersecurity Solutions for Businesses & IT Professionals
Computer Security Analysis: Threat, Vulnerability & Countermeasure Guide | Cybersecurity Solutions for Businesses & IT Professionals
$77.67
$103.57
25% Off
Quantity:
Delivery & Return: Free shipping on all orders over $50
Estimated Delivery: 10-15 days international
18 people viewing this product right now!
SKU: 57289613
Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay
shop
Description
“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”―Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective CountermeasuresAnalyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security―so you can prevent serious problems and mitigate the effects of those that still occur.In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger―authors of the classic Security in Computing―teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it’s useless “security theater” Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media
More
Shipping & Returns

For all orders exceeding a value of 100USD shipping is offered for free.

Returns will be accepted for up to 10 days of Customer’s receipt or tracking number on unworn items. You, as a Customer, are obliged to inform us via email before you return the item.

Otherwise, standard shipping charges apply. Check out our delivery Terms & Conditions for more details.

Reviews
*****
Verified Buyer
5
I LOVE this book. The Pfleeger's take each topic and disect it then tell the vulnerabilities and how to protect against them. I wish others would take this approach. It's clear, easy to understand and covers the highlights. It's a great after-the-basics book and a great reference for anyone. I've been following Sherri's Software Engineering writing for years and trust their expertise so I know it is well researched and trustworthy.

You Might Also Like

Top