Analyzing Computer Security

Analyzing Computer Security

4.11 - 1251 ratings - Source

A fresh new approach to computer security by the authors of the 20-year best-selling classic Security in Computing. a€c a€cIntroduces computer security the way today's practitioners want to learn it: by identifying threats, explaining the vulnerabilities that cause them, and presenting effective countermeasures. a€cContains up-to-date coverage of security management, risk analysis, privacy, controls, forensics, insider attacks, human factors, trust, and more. a€cIncludes 273 problems and 192 illustrations. In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers' new Analyzing Computer Security will attract readers' attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today's most effective countermeasures for blocking or weakening the attack. One step at a time, readers progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust. addresses crucial contemporary computer securityJust for perspective, that amount is more than 1, 500 times the U.S. national debt or 50, 000 times the net worth of Bill ... For example, a requirements fault that surfaces during a code review should probably have been found during a ... The fault log can also be used to build a checklist of items to be sought in future reviews.

Title:Analyzing Computer Security
Author:Charles P. Pfleeger, Shari Lawrence Pfleeger
Publisher:Prentice Hall Professional - 2012


You Must CONTINUE and create a free account to access unlimited downloads & streaming