Introduction to Computer and Network Security,Used
Introduction to Computer and Network Security,Used
Introduction to Computer and Network Security,Used

Introduction to Computer and Network Security,Used

In Stock
SKU: SONG1439860718
Brand: CRC Press
Condition: Used
Regular price$32.05
Quantity
Add to wishlist
Add to compare
Sold by Ergodebooks, an authorized reseller.

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security IssuesTaking an interactive, "learnbydoing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security.The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems.Extensively classroomtested, the material is structured around a set of challenging projects. Through staging exploits and choosing countermeasures to neutralize the attacks in the projects, students learn:How computer systems and networks operate How to reverseengineer processes How to use systems in ways that were never foreseen (or supported) by the original developersCombining handson work with technical overviews, this text helps you integrate security analysis into your technical computing curriculum. It will educate your students on security issues, such as sidechannel attacks, and deepen their understanding of how computers and networks work.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed