Professional >> Engineering and Computer Science >> Computer Science >> Computer Science


Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

Analyzing Computer Security:   A Threat / Vulnerability / Countermeasure Approach

Author(s):
  • Charles P. Pfleeger
  • Author: Charles P. Pfleeger
    • ISBN:9789332517424
    • 10 Digit ISBN:9332517428
    • Price:Rs. 1115.00
    • Pages:848
    • Imprint:Pearson Education
    • Binding:Paperback
    • Status:Available


    Be the first to rate the book !!

    In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract students attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis economics and quantitative study privacy, ethics, and laws and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust.

    Salient Features

    • Introduces computer security the way today's practitioners want to learn it: by identifying threats, explaining the vulnerabilities that cause them, and presenting effective countermeasures
    • Contains up-to-date coverage of security management, risk analysis, privacy, controls, forensics, insider attacks, human factors, trust, and more