|Listed in category:
Have one to sell?
CH Media Store
(6407)
Registered as a private seller
Consumer protection regulations resulting from EU consumer law are therefore not applicable. eBay buyer protection still applies to most purchases.

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

US $32.40
ApproximatelyΒ£24.31
or Best Offer
Was US $36.00 (10% off)What does this price mean?
Recent sales price provided by the seller
Condition:
Very Good
β€œVery good condition with clean pages.”
Offer ends in: 7d 17h
Breathe easy. Returns accepted.
Postage:
US $8.38 (approx Β£6.29) USPS Media MailTM.
Located in: Woodbridge, Virginia, United States
Delivery:
Estimated between Mon, 5 May and Thu, 8 May to 43230
Estimated delivery dates - opens in a new window or tab reflect seller's dispatch time, origin postcode, destination postcode and time of order receipt, and will depend on the delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods, and are an estimate only.
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:155325521048

Item specifics

Condition
Very Good
A book that has been read and does not look new, but is in excellent condition. No obvious damage to the book cover, with the dust jacket (if applicable) included for hard covers. No missing or damaged pages, no creases or tears, no underlining or highlighting of text, and no writing in the margins. Some identifying marks on the inside cover, but this is minimal. Very little wear and tear. See the seller’s listing for full details and description of any imperfections. See all condition definitionsopens in a new window or tab
Seller notes
β€œVery good condition with clean pages.”
ISBN
9780132789462

About this product

Product Identifiers

Publisher
Pearson Education
ISBN-10
0132789469
ISBN-13
9780132789462
eBay Product ID (ePID)
109076786

Product Key Features

Number of Pages
848 Pages
Language
English
Publication Name
Analyzing Computer Security : a Threat / Vulnerability / Countermeasure Approach
Subject
Security / General, Security / Networking
Publication Year
2011
Features
Revised
Type
Textbook
Author
Shari Pfleeger, Charles Pfleeger
Subject Area
Computers
Format
Hardcover

Dimensions

Item Height
1.3 in
Item Weight
42 Oz
Item Length
9.4 in
Item Width
7.2 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2011-013943
Reviews
"This is a must-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book."-John Hughes, InfoSec Reviews, "This is aΒ must-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book."-John Hughes, InfoSec Reviews, "This is amust-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of security architectures, as well as to anyone who already has that title and wants a good quality reference book."-John Hughes, InfoSec Reviews
Dewey Edition
23
Dewey Decimal
005.8
Edition Description
Revised edition
Synopsis
In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organised around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract students' attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust., "In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology." --Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic Security in Computing--teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it's useless "security theater" Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media, "In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology." --Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic Security in Computing --teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it's useless "security theater" Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media, "In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology." Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger authors of the classic Security in Computing teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it's useless "security theater" Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more Understanding, preventing, and mitigating DOS and DDOS attacks Architecting more secure wired and wireless networks Building more secure application software and operating systems through more solid designs and layered protection Protecting identities and enforcing privacy Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media
LC Classification Number
QA76.9.A25P4485 2011

Item description from the seller

About this seller

CH Media Store

99.9% positive Feedbackβ€’20K items sold

Joined Jul 2020
Usually responds within 24 hours
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.

Detailed seller ratings

Average for the last 12 months
Accurate description
5.0
Reasonable postage cost
4.8
Delivery time
5.0
Communication
5.0

Seller Feedback (6,671)

All ratings
Positive
Neutral
Negative
  • l***c (5317)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    πŸ’₯ EXCELLENT MERCHANT, Very Good Tractions I've Had in a While β˜… Nice Quality Merchandise β˜… Exactly as Described, Good Value & Price, Used Item Great Condition { Columbo The Complete DVD Series Seasons 1-7 + Mystery Movie Collection } β˜… Packaged Securely & Boxed β˜… Fast Shipping β˜… Very Happy, Thx β˜… 5+ Stars β˜… Highly Recommend This Merchant to All, Thx Again! β˜…β˜…β˜…β˜…β˜…+ β˜… An A+ Preferred Merchant, & Transaction. No Rips or Tears! β˜… Hope we could do more Future business together! PERFECT!πŸ’₯
  • h***e (23)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    The seller did a great job packaging my books. They were well protected during shipment. The condition was as as described however Book 7 was more worn. Overall great value. Would definitely buy from this seller again!
  • d***4 (13)- Feedback left by buyer.
    Past month
    Verified purchase
    Overall very happy with the product. My ONLY complaint is there are visible lines all throughout the concert. Very annoying and distracting. I don’t blame the seller though. Best guess this is the result of converting data recorded in 1985 to DVD. Seller is probably unaware of the issue. I would offer more than 5 stars if I could regarding the rest of the transaction. Condition of the packaging is good, offered at a fair price and was shipped right away. Would buy from this seller again.