Afbeelding 1 van 1
Introduction to Computer and Network Security: Navigating Shades of Gray: Used
Objectstaat:
Verzendkosten:
Bevindt zich in: Sparks, Nevada, Verenigde Staten
Levering:
Geschatte levering tussen vr, 31 mei en wo, 5 jun tot 43230
Retourbeleid:
30 dagen om te retourneren. Koper betaalt voor retourzending. Details bekijken- voor meer informatie over retourzendingen
Betalingen:
Winkel met vertrouwen
Verkopergegevens
- 98,5% positive feedback
Ingeschreven als zakelijke verkoper
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:364271485859
Specificaties
- Objectstaat
- Book Title
- Introduction to Computer and Network Security: Navigating Shades
- Publication Date
- 2013-08-19
- ISBN
- 9781439860717
- Publication Year
- 2013
- Type
- Textbook
- Format
- Hardcover
- Language
- English
- Publication Name
- Introduction to Computer and Network Security : Navigating Shades of Gray
- Item Height
- 0.9in
- Item Length
- 9.5in
- Publisher
- CRC Press LLC
- Item Width
- 6.1in
- Item Weight
- 20.8 Oz
- Number of Pages
- 320 Pages
Over dit product
Product Information
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems. Extensively classroom-tested, the material is structured around a set of challenging projects. Through staging exploits and choosing countermeasures to neutralize the attacks in the projects, students learn: How computer systems and networks operate How to reverse-engineer processes How to use systems in ways that were never foreseen (or supported) by the original developers Combining hands-on work with technical overviews, this text helps you integrate security analysis into your technical computing curriculum. It will educate your students on security issues, such as side-channel attacks, and deepen their understanding of how computers and networks work.
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1439860718
ISBN-13
9781439860717
eBay Product ID (ePID)
99510344
Product Key Features
Publication Name
Introduction to Computer and Network Security : Navigating Shades of Gray
Format
Hardcover
Language
English
Publication Year
2013
Type
Textbook
Number of Pages
320 Pages
Dimensions
Item Length
9.5in
Item Height
0.9in
Item Width
6.1in
Item Weight
20.8 Oz
Additional Product Features
Lc Classification Number
Qa76.9.A25
Reviews
"... a comprehensive and adequately 'time-resistant' introduction to the field of computer and network security. ... interesting and useful. It could help the average technical reader acquire an adequate level of introductory knowledge on computer and network security." --Computers & Security, 46, 2014 "This definitive, comprehensive computer security textbook reflects Brooks's long-term study of this topic and his experience gained through teaching it. ... very well written, readily comprehensible, and thoroughly documented and annotated, and includes an extensive bibliography. ... Highly recommended." --E.M. Aupperle, Emeritus, University of Michigan, CHOICE Magazine, June 2014, "This definitive, comprehensive computer security textbook reflects Brooks's long-term study of this topic and his experience gained through teaching it. ... very well written, readily comprehensible, and thoroughly documented and annotated, and includes an extensive bibliography. ... Highly recommended." --E. M. Aupperle, emeritus, University of Michigan in CHOICE Magazine, June 2014
Table of Content
Brief History of Computers, Communications, and Security Pre-Renaissance Renaissance to World War I World War I World War II Cold War Organized Crime and Botnets Cyberwar Security and Privacy Overview Security Attributes Social Engineering Authentication and Authorization Access Permissions Audit User Interface Issues On Trusting Trust Taxonomy of Attacks Case Study--Mobile Code Case Study--Connected Vehicles Cryptography Primer Substitution Ciphers and Frequency Analysis Vignère Cipher and Cryptanalysis Block Ciphers RSA Public Key Cryptography Hash Functions One-Time Pads Key Management Message Confidentiality Steganography Obfuscation and Homomorphic Encryption SSL/TLS--Case Study Project Cryptographic Protocol Verification DNS and Routing X.509 and SSL Certificates Security Flaws With Certificates Man-in-the-Middle Attacks Implementation Flaws Usability Securing Networks Firewalls Virtual Private Networks (VPNs) Wireless Security Intrusion Detection Systems (IDS) Denial of Service Virtual Private Network--Case Study Project Laboratory Preparation Assignment Virtual Machine (VM) Use Sniffer Use VPN Installation Insertion Attacks SQL Injection Buffer Overflow Attack Printer Format Vulnerability SSH Insertion Attacks IDS Insertion Attacks Viruses Worms Virus and Worm Propagation Buffer Overflow--Case Study Project Stack Smashing Heap Smashing Arc Injection Pointer Clobbering Countermeasures Polymorphic Virus--Advanced Case Study Project Virus Basics Antivirus Pseudovirus with Alternate Data Streams Simple Virus--Timid Infection Spreading Self-Modifying Code Simple Polymorphism Packing and Encryption Frankenstein Viruses Web Security Cross Site Scripting (XSS) Cross Site Request Forgery (XSRF, CSRF) Man-in-the-Browser Penetration Testing Privacy and Anonymity Anonymity Metrics Anonymity Tools Computer Forensics Tools Privacy Laws Privacy Discussion Assignments--Antonin Scalia Side-Channel Attacks Power Analysis Traffic Analysis Time Analysis Red-Black Separation Side-Channel Countermeasures Digital Rights Management and Copyright Copyright History Fair Use Creative Commons Digital Rights Management Digital Millennium Copyright Act The Darknet Patent Trolls Discussion Assignment--Business Case for DRM Discussion Assignment--Technical Case for DRM Security Economics Liability and EULAs Network Externalities Code Bloat Lemon Markets Software Engineering Macroeconomics and Game Theory Introduction Conclusions Bibliography Index Problems and a Glossary appear at the end of each chapter.
Copyright Date
2013
Topic
Programming / Games, Security / Cryptography, Security / General, Security / Networking
Lccn
2013-026150
Dewey Decimal
005.8
Intended Audience
College Audience
Dewey Edition
23
Illustrated
Yes
Genre
Computers
Objectbeschrijving van de verkoper
Informatie van zakelijke verkoper
Alibris, Inc.
Rob Lambert
2560 9th St
Ste 215
94710-2565 Berkeley, CA
United States
Ik verklaar dat al mijn verkoopactiviteiten zullen voldoen aan alle wet- en regelgeving van de EU.
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:364271485859
Verzending en verwerking
Objectlocatie:
Sparks, Nevada, Verenigde Staten
Wordt verzonden naar:
Albanië, Andorra, Angola, Anguilla, Antigua en Barbuda, Argentinië, Armenië, Aruba, Australië, Azerbeidzjan, Bahama's, Bahrein, Bangladesh, België, Belize, Benin, Bermuda, Bhutan, Bolivia, Bosnië en Herzegovina, Botswana, Brunei Darussalam, Bulgarije, Burkina Faso, Burundi, Cambodja, Canada, Centraal-Afrikaanse Republiek, Chili, China, Colombia, Costa Rica, Cyprus, Democratische Republiek Congo, Denemarken, Djibouti, Dominicaanse Republiek, Duitsland, Ecuador, Egypte, El Salvador, Equatoriaal-Guinea, Eritrea, Estland, Ethiopië, Fiji, Filipijnen, Finland, Frankrijk, Gabon, Gambia, Georgië, Ghana, Gibraltar, Grenada, Griekenland, Groenland, Guatemala, Guinee, Guyana, Haïti, Honduras, Hongarije, Hongkong, IJsland, Ierland, India, Indonesië, Israël, Italië, Ivoorkust, Jamaica, Japan, Jemen, Jordanië, Kaaimaneilanden, Kaapverdische eilanden, Kameroen, Kazachstan, Kenia, Kirgizië, Kiribati, Koeweit, Kroatië, Laos, Lesotho, Letland, Libanon, Liechtenstein, Litouwen, Luxemburg, Macau, Macedonië, Madagaskar, Malawi, Maldiven, Maleisië, Mali, Malta, Marokko, Mauritanië, Mauritius, Mexico, Moldavië, Monaco, Mongolië, Montenegro, Montserrat, Mozambique, Namibië, Nauru, Nederland, Nepal, Nicaragua, Nieuw-Zeeland, Niger, Noorwegen, Oeganda, Oezbekistan, Oman, Oostenrijk, Pakistan, Panama, Papoea-Nieuw-Guinea, Paraguay, Peru, Polen, Portugal, Qatar, Republiek Congo, Roemenië, Rwanda, Saint Kitts en Nevis, Saint Lucia, Saint Vincent en de Grenadines, San Marino, Saudi-Arabië, Senegal, Servië, Seychellen, Sierra Leone, Singapore, Slovenië, Slowakije, Solomoneilanden, Spanje, Sri Lanka, Suriname, Swaziland, Tadzjikistan, Taiwan, Tanzania, Thailand, Togo, Tonga, Trinidad en Tobago, Tsjaad, Tsjechië, Tunesië, Turkije, Turkmenistan, Turks- en Caicoseilanden, Uruguay, Vanuatu, Vaticaanstad, Verenigd Koninkrijk, Verenigde Arabische Emiraten, Verenigde Staten, Vietnam, Wallis en Futuna, Westelijk Samoa, Zambia, Zimbabwe, Zuid-Afrika, Zuid-Korea, Zweden, Zwitserland
Uitgesloten:
APO/FPO, Afghanistan, Alaska/Hawaï, Algerije, Amerikaanse protectoraten, Barbados, Brazilië, Frans-Guyana, Frans-Polynesië, Guadeloupe, Guinee-Bissau, Irak, Liberia, Libië, Martinique, Nieuw-Caledonië, Nigeria, Oekraïne, Russische Federatie, Réunion, Venezuela, Wit-Rusland
Verzending en verwerking | Tot | Service | Levering*Zie opmerkingen over levering |
---|---|---|---|
Gratis verzending | Verenigde Staten | Standard Shipping | Geschatte levering tussen vr, 31 mei en wo, 5 jun tot 43230 |
US $5,50 (ongeveer EUR 5,07) | Verenigde Staten | Expedited Shipping | Geschatte levering tussen do, 30 mei en za, 1 jun tot 43230 |
Verwerkingstijd |
---|
Wordt doorgaans binnen 2 werkdagen na ontvangst van betaling verzonden. |
Belasting |
---|
Verkoper berekent btw in |
Btw voor objectnr.364271485859
Btw voor objectnr.364271485859
Verkoper berekent btw op objecten die naar de volgende staten worden verzonden:
Staat | Btw-tarief |
---|
Retourbeleid
Nadat u het object hebt ontvangen, kunt u contact opnemen met de verkoper binnen | Terugbetaling wordt verstrekt als | Kosten voor retourzending |
---|---|---|
30 dagen | Geld terug | Koper betaalt voor retourzending |
De koper is verantwoordelijk voor de kosten van de retourzending.
Details retourbeleid |
---|
Retourzendingen geaccepteerd |
Betalingsgegevens
Betalingsmethoden
Ingeschreven als zakelijke verkoper
Feedback verkoper (460.152)
f***w (515)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Perfect
6***0 (2561)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Excellent!! Thank you!!!
r***l (588)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Product as described, fast shipping; thanks!