Notifications can be turned off anytime from settings.
Item(s) Added To cart
Qty.
Something went wrong. Please refresh the page and try again.
Something went wrong. Please refresh the page and try again.
Exchange offer not applicable. New product price is lower than exchange product price
Please check the updated No Cost EMI details on the payment page
Exchange offer is not applicable with this product
Exchange Offer cannot be clubbed with Bajaj Finserv for this product
Product price & seller has been updated as per Bajaj Finserv EMI option
Please apply exchange offer again
Your item has been added to Shortlist.
View AllYour Item has been added to Shopping List
View All
No Cost EMI of Zero Emi Vendor applied on the product
You selected EMI of for monthsChangeGenerally delivered in 5 - 9 days
Item is available at . Change
You will be notified when this product will be in stock
|
This book offers complete coverage of all aspects of computer security, including users, software, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks, countermeasures, and computing environments, it introduces up-to-the-minute best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more.
About the Author
Charles Pfleeger is an internationally known expert on computer and communications security. He was originally a professor at the University of Tennessee, leaving there to join computer security research and consulting companies Trusted Information Systems and Arca Systems (later Exodus Communications and Cable and Wireless). With Trusted Information Systems he was Director of European Operations and Senior Consultant. With Cable and Wireless he was Director of Research and a member of the staff of the Chief Security Officer. He was chair of the IEEE Computer Society Technical Committee on Security and Privacy.
Shari Lawrence Pfleeger is widely known as a software engineering and computer security researcher, most recently as a Senior Computer Scientist with the Rand Corporation and as Research Director of the Institute for Information Infrastructure Protection. She is currently Editor in Chief of IEEE Security & Privacy magazine.
Jonathan Margulies is the CTO of Qmulos, a cybersecurity consulting firm. After receiving his Masters Degree in Computer Science from Cornell University, Mr. Margulies spent nine years at Sandia National Labs, researching and developing solutions to protect national security and critical infrastructure systems from advanced persistent threats. He then went on to NIST's National Cybersecurity Center of Excellence, where he worked with a variety of critical infrastructure companies to create industry-standard security architectures. In his free time, Mr. Margulies edits the “Building Security In” section of IEEE Security & Privacy magazine.
Features
This classic text has been thoroughly updated to reflect today’s newest technologies, standards, and trends
Topics progress from simple and straightforward to complex and intricate
Easy-to-read descriptions of concepts and incidents
As of Oct, 2015, there are new, vastly improved PowerPoint slides for instructor use
Table Content
Foreword
Preface
Acknowledgments
About the Authors
Chapter 1: Introduction
Chapter 2: Toolbox: Authentication, Access Control, and Cryptography
Chapter 3: Programs and Programming
Chapter 4: The Web—User Side
Chapter 5: Operating Systems
Chapter 6: Networks
Chapter 7: Databases
Chapter 8: Cloud Computing
Chapter 9: Privacy
Chapter 10: Management and Incidents
Chapter 11: Legal Issues and Ethics
Chapter 12: Details of Cryptography
Chapter 13: Emerging Topics
Bibliography
Index
The images represent actual product though color of the image and product may slightly differ.
Register now to get updates on promotions and
coupons. Or Download App