Picture 1 of 3



Gallery
Picture 1 of 3



Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
US $32.40
ApproximatelyΒ£24.31
or Best Offer
Was US $36.00 (10% off)
Condition:
βVery good condition with clean pages.β
Very Good
A book that has been read and does not look new, but is in excellent condition. No obvious damage to the book cover, with the dust jacket (if applicable) included for hard covers. No missing or damaged pages, no creases or tears, no underlining or highlighting of text, and no writing in the margins. Some identifying marks on the inside cover, but this is minimal. Very little wear and tear. See the sellerβs listing for full details and description of any imperfections.
Offer ends in: 7d 17h
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
US $8.38 (approx Β£6.29) USPS Media MailTM.
Located in: Woodbridge, Virginia, United States
Delivery:
Estimated between Mon, 5 May and Thu, 8 May to 43230
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:155325521048
Item specifics
- Condition
- Very Good
- Seller notes
- βVery good condition with clean pages.β
- ISBN
- 9780132789462
About this product
Product Identifiers
Publisher
Pearson Education
ISBN-10
0132789469
ISBN-13
9780132789462
eBay Product ID (ePID)
109076786
Product Key Features
Number of Pages
848 Pages
Language
English
Publication Name
Analyzing Computer Security : a Threat / Vulnerability / Countermeasure Approach
Subject
Security / General, Security / Networking
Publication Year
2011
Features
Revised
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
1.3 in
Item Weight
42 Oz
Item Length
9.4 in
Item Width
7.2 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2011-013943
Reviews
"This is a must-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book."-John Hughes, InfoSec Reviews, "This is aΒ must-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book."-John Hughes, InfoSec Reviews, "This is amust-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book."-John Hughes, InfoSec Reviews
Dewey Edition
23
Dewey Decimal
005.8
Edition Description
Revised edition
Synopsis
In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organised around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract students' attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust., "In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology." --Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic Security in Computing--teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it's useless "security theater" Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media, "In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology." --Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic Security in Computing --teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it's useless "security theater" Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media, "In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology." Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger authors of the classic Security in Computing teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it's useless "security theater" Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media
LC Classification Number
QA76.9.A25P4485 2011
Item description from the seller
About this seller
CH Media Store
99.9% positive Feedbackβ’20K items sold
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Seller Feedback (6,671)
- l***c (5317)- Feedback left by buyer.Past 6 monthsVerified purchaseπ₯ EXCELLENT MERCHANT, Very Good Tractions I've Had in a While β Nice Quality Merchandise β Exactly as Described, Good Value & Price, Used Item Great Condition { Columbo The Complete DVD Series Seasons 1-7 + Mystery Movie Collection } β Packaged Securely & Boxed β Fast Shipping β Very Happy, Thx β 5+ Stars β Highly Recommend This Merchant to All, Thx Again! β β β β β + β An A+ Preferred Merchant, & Transaction. No Rips or Tears! β Hope we could do more Future business together! PERFECT!π₯
- h***e (23)- Feedback left by buyer.Past 6 monthsVerified purchaseThe seller did a great job packaging my books. They were well protected during shipment. The condition was as as described however Book 7 was more worn. Overall great value. Would definitely buy from this seller again!Amulet #1-8 Box Set, Kibuishi, Kazu, Very Good Book (#156615627129)
- d***4 (13)- Feedback left by buyer.Past monthVerified purchaseOverall very happy with the product. My ONLY complaint is there are visible lines all throughout the concert. Very annoying and distracting. I donβt blame the seller though. Best guess this is the result of converting data recorded in 1985 to DVD. Seller is probably unaware of the issue. I would offer more than 5 stars if I could regarding the rest of the transaction. Condition of the packaging is good, offered at a fair price and was shipped right away. Would buy from this seller again.
Product ratings and reviews
More to explore:
- Non-Fiction Computer Security Paperback Fiction & Books,
- Non-Fiction Computer Security Fiction & Non-Fiction Books,
- Non-Fiction Fiction Books & Security,
- Non-Fiction Security Hardcover Books,
- Computer & IT Computer Active Magazines,
- Computer & IT September Computer Active Magazines,
- Computer & IT Magazines,
- Computer Music Magazines,
- Computer & IT Monthly Magazines,
- Computer Active Magazines