Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Computer Security: A Hands-on Approach by Du, Wenliang
US $53.99
ApproximatelyS$ 68.90
Condition:
Brand New
A new, unread, unused book in perfect condition with no missing or damaged pages.
4 available
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: Columbia, Missouri, United States
Delivery:
Estimated between Mon, 22 Sep and Sat, 27 Sep to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:235474022729
Item specifics
- Condition
- Brand New: A new, unread, unused book in perfect condition with no missing or damaged pages. See all condition definitionsopens in a new window or tab
- Book Title
- Computer Security: A Hands-on Approach
- ISBN
- 9781548367947
About this product
Product Identifiers
Publisher
CreateSpace
ISBN-10
154836794X
ISBN-13
9781548367947
eBay Product ID (ePID)
4038647918
Product Key Features
Number of Pages
430 Pages
Publication Name
Computer Security : a Hands-On Approach
Language
English
Publication Year
2017
Subject
Security / General
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1 in
Item Weight
32.4 Oz
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Intended Audience
Trade
Synopsis
This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software systems and applications that are secure against attacks. They will also be able to evaluate the risks faced by computer and network systems, detect common vulnerabilities in software, use proper methods to protect their systems and networks, and more importantly, apply the learned security principles to solve real-world problems. The author strongly believes in "learning by doing" , so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch," play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). If a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-firewall or mini-VPN. Readers can learn better from such hands-on activities. All the hands-on activities are conducted in a virtual machine image provided by the author. They can be downloaded from this URL: http: //www.cis.syr.edu/ wedu/seed/. Everything needed for the activities have already been set up; readers just need to download the VM (free), launch it using VirtualBox, and they can immediately work on the activities covered in the book. This book is based on the Ubuntu12.04 VM image. The author will regularly upgrade the VM image in every few years. Most of the activities in the book are based on the author's SEED labs, which are widely used by instructors all over the world. These labs are the results of 15 years' research, development, and testing efforts conducted by the author and his students in a project called SEED, which has been funded by the National Science Foundation since 2002., This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software systems and applications that are secure against attacks. They will also be able to evaluate the risks faced by computer and network systems, detect common vulnerabilities in software, use proper methods to protect their systems and networks, and more importantly, apply the learned security principles to solve real-world problems.The author strongly believes in "learning by doing" , so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). If a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-firewall or mini-VPN. Readers can learn better from such hands-on activities.All the hands-on activities are conducted in a virtual machine image provided by the author. They can be downloaded from this URL: http://www.cis.syr.edu/~wedu/seed/. Everything needed for the activities have already been set up; readers just need to download the VM (free), launch it using VirtualBox, and they can immediately work on the activities covered in the book. This book is based on the Ubuntu12.04 VM image. The author will regularly upgrade the VM image in every few years.Most of the activities in the book are based on the author's SEED labs, which are widely used by instructors all over the world. These labs are the results of 15 years' research, development, and testing efforts conducted by the author and his students in a project called SEED, which has been funded by the National Science Foundation since 2002.
Item description from the seller
Seller feedback (41,546)
- Automatyczna opinia eBay- Feedback left by buyer.Past monthZamówienie zostało zrealizowane – ze śledzeniem i na czas
- Automatyczna opinia eBay- Feedback left by buyer.Past monthZamówienie zostało zrealizowane – ze śledzeniem i na czas
- Automatyczna opinia eBay- Feedback left by buyer.Past monthZamówienie zostało zrealizowane – ze śledzeniem i na czas