Introduction to Computer and Network Security

Regular price €104.99
Quantity:
Ships in 10-20 days
Delivery/Collection within 10-20 working days
Shipping & Delivery
A01=Richard R. Brooks
advanced system exploitation techniques
Age Group_Uncategorized
Age Group_Uncategorized
and users
Author_Richard R. Brooks
automatic-update
Block Ciphers
Buffer Overflow
Buffer Overflow Exploit
buffer overflow prevention
Business Case
Category1=Non-Fiction
Category=PBCD
Category=UBL
Category=UR
Category=UY
computer security textbook
COP=United States
Cross Site Request Forgery
Cross Site Scripting
Delivery_Delivery within 10-20 working days
design decisions affecting security
digital rights management
DNS Server
DVD Content
End User License Agreements
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
Homomorphic Encryption
How computer systems and networks operate
How to reverse-engineer processes
Insertion Attacks
IP Address
IPv6 Address
ISO File
IT Security
Language_English
of networks and computer operations exploited by attackers
PA=Available
Packet Filters
Power Consumption
Price_€50 to €100
privacy and anonymity
PS=Active
S Box
security analysis in a technical computing curriculum.
security economics
Shell Code
side-channel analysis
side-channel attacks
Sis Model
softlaunch
software
SQL Injection
SQL Injection Attack
system security and the interactions between hardware
TCP Connection
TCP Port
VM
web application threats

Product details

  • ISBN 9781439860717
  • Weight: 618g
  • Dimensions: 152 x 229mm
  • Publication Date: 19 Aug 2013
  • Publisher: Taylor & Francis Inc
  • Publication City/Country: US
  • Product Form: Hardback
  • Language: English
Secure checkout Fast Shipping Easy returns

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security.

The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems.

Extensively classroom-tested, the material is structured around a set of challenging projects. Through staging exploits and choosing countermeasures to neutralize the attacks in the projects, students learn:

  • How computer systems and networks operate
  • How to reverse-engineer processes
  • How to use systems in ways that were never foreseen (or supported) by the original developers

Combining hands-on work with technical overviews, this text helps you integrate security analysis into your technical computing curriculum. It will educate your students on security issues, such as side-channel attacks, and deepen their understanding of how computers and networks work.

Richard R. Brooks is an associate professor in the Holcombe Department of Electrical and Computer Engineering at Clemson University. His research has been sponsored by both government and industry, including the U.S. Office of Naval Research, Defense Advanced Research Projects Agency, National Institute of Standards and Technology, National Science Foundation, and BMW Manufacturing Co. He received a Ph.D. in computer science from Louisiana State University.

More from this author