- Shopping Bag ( 0 items )
From the Publisher"Yes, this chapter introduces a wide array of technical terminology, in which the author does a fantastic job of breaking it down so that novice learners can comprehend it. Yes, the examples in this chapter are excellent in that they allow the reader to relate to the technical concepts in a comparative way. The Hands-on Projects for this chapter tie in well with the material presented. I believe that they provide students with several different ways to see how some of the attacks explained in the chapter are executed and how they can be prevented. I am now officially excited about the publication of this text, wish it was available for the Summer 2011 section that I am teaching using the 3rd edition."
"Clear and Concise coverage of a difficult and dynamic subject. Engaging for students, using examples and stories."
"An excellent introduction to different types of Malware. An excellent coverage of Social Engineering techniques. Chapter one gives an overview of Information Security and threats. The fact that author has included one of the most current security threat (Stuxnet) at the beginning of the chapter is excellent. This will get the attention of the learners."