Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. Charles P. Pfleeger. Shari Lawrence Pfleeger. © |Prentice Hall |. Analyzing Computer Security is a fresh, modern, and relevant introduction to . Dr. Charles P. Pfleeger, an independent computer and information security. Analyzing Computer Security: A Threat/vulnerability/countermeasure Approach. By Charles P. Pfleeger, Shari Lawrence Pfleeger.

Author: Arashijas Shaktill
Country: Cayman Islands
Language: English (Spanish)
Genre: Spiritual
Published (Last): 6 April 2014
Pages: 443
PDF File Size: 11.37 Mb
ePub File Size: 17.21 Mb
ISBN: 571-3-75428-862-7
Downloads: 97121
Price: Free* [*Free Regsitration Required]
Uploader: Arashihn

As an overview of computer security it is just O.

Amazon Inspire Digital Educational Resources. Pfleeger and Shari Lawrence Pfleeger-authors of the classic Security in Computing-teach security the way modern security professionals approach it: Mapping the Cyber Underworld.

Addressee Cannot Be Found Vulnerability: Kindle Edition Verified Purchase. Prentice Hall; 1 edition September 4, Language: Inadequate Attention to Program Details Vulnerability: Physical Access Control Countermeasure: Identifying and Classifying Faults 86 Countermeasure: Impersonation 39 Attack Details: Denial of Service Extended Attack: Exploitation of Known Vulnerability Vulnerability: He Who Steals My Purse Nonsecret Token Countermeasure: The authors also present significant new material on seccurity forensics, insiders, human factors, and trust.


Analyzing Computer Security : Shari Lawrence Pfleeger :

Coverage includes Understanding threats, vulnerabilities, and countermeasures Knowing when security is useful, and when it’s useless “security theater” Implementing effective identification and authentication systems Using modern cryptography and overcoming weaknesses in cryptographic systems Protecting against malicious code: Exposure to Unauthorized Access Vulnerability: Undocumented Access Point Ineffective Countermeasure: Scanning the Horizon Attack: As a textbook it is poor at best.

Security Through Obscurity Countermeasure: Secruity Data Disclosure Threat: I wish others would take this approach. Physical Security Countermeasure: Legal Action Countermeasure: Physical Disconnection Countermeasure: Code Flaws Vulnerability: I had to get this book for a class I was taking.

Download Power Point Slides Chapter 1 1. Off-by-One Error Vulnerability: PfleegerShari Lawrence Pfleeger. Set up a giveaway.

You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. Unintended Disclosure Vulnerability: Data Redundancy Backup Backup Countermeasure: User Review – Flag as inappropriate 1.

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

Operating System Structure Attack: Unauthorized Access Vulnerability: Furthermore, the authors don’t seem to have a firm grasp on cryptography at all, so the whole of chapter 7 is littered with glaring errors. He Who Steals My Purse.


You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics.

Usability Contents note continued: