Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach

Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach

5.0 1
by Charles P. Pfleeger, Shari Lawrence Pfleeger
     
 

View All Available Formats & Editions

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results

Overview

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 

Product Details

ISBN-13:
9780132901062
Publisher:
Pearson Education
Publication date:
08/18/2011
Sold by:
Barnes & Noble
Format:
NOOK Book
Pages:
896
File size:
14 MB
Note:
This product may take a few minutes to download.

Related Subjects

Meet the Author

Dr. Charles P. Pfleeger, an independent computer and information security consultant, provides threat/vulnerability analysis, design review, training, expert testimony, and security advice to clients worldwide. He was master security architect at Cable and Wireless and Exodus Communications, and professor of computer science at the University of Tennessee. Dr. Pfleeger is coauthor of Security in Computing, Fourth Edition (Prentice Hall, 2007), today’s leading college computer security textbook.

 

Dr. Shari Lawrence Pfleeger is Director of Research for the Institute for Information Infrastructure Protection at Dartmouth College, a consortium working to protect the U.S. cyber infrastructure. The Journal of Systems and Software has repeatedly named her one of the world’s top software engineering researchers. Dr. Pfleeger is coauthor of Security in Computing, Fourth Edition (Prentice Hall, 2007), today’s leading college computer security textbook.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach 5 out of 5 based on 0 ratings. 1 reviews.
Avidreader33 More than 1 year ago
A core value of this publication is the Threat-Vulnerability-Countermeasure paradigm the authors adopted in exploring a wide range of computer security challenges: threats as the potential for harm from multiple sources, vulnerability as an identifiable system weakness, and countermeasure or control as means of defense and protection. When combined with numerous encyclopedic explanations, this makes it a solid security reference and solutions guide. Given the multiple intended audiences for this book (students, computing professionals, and end-users) the exercises at the end of each chapter are an expected standard fare. But for those readers in a deep dive mode, they facilitate not only a means of review but also a mechanism for a further exploration of covered topics. Chapter titles are humorous, euphemistic at times, drawing and engaging the reader into the real security story behind them. References to recent high-profile cyber events and several interludes (mini-chapters) on Cyber Warfare, Electronic Voting, and Cloud Computing are a welcome addition to this already solid computing security reference. I am keeping it close by, within reach.