Picture 1 of 1
Introduction to Computer and Network Security: Navigating Shades of Gray: Used
Condition:
Postage:
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Fri, 28 Jun and Wed, 3 Jul to 43230
Returns:
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Shop with confidence
Seller information
- 98.5% positive feedback
Registered as a Business Seller
Seller assumes all responsibility for this listing.
eBay item number:364271485859
Item specifics
- Condition
- Book Title
- Introduction to Computer and Network Security: Navigating Shades
- Publication Date
- 2013-08-19
- ISBN
- 9781439860717
- Subject Area
- Computers
- Publication Name
- Introduction to Computer and Network Security : Navigating Shades of Gray
- Publisher
- CRC Press LLC
- Item Length
- 9.5 in
- Subject
- Programming / Games, Security / Cryptography, Security / General, Security / Networking
- Publication Year
- 2013
- Type
- Textbook
- Format
- Hardcover
- Language
- English
- Item Height
- 0.9 in
- Item Weight
- 20.8 Oz
- Item Width
- 6.1 in
- Number of Pages
- 320 Pages
About this product
Product Information
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems. Extensively classroom-tested, the material is structured around a set of challenging projects. Through staging exploits and choosing countermeasures to neutralize the attacks in the projects, students learn: How computer systems and networks operate How to reverse-engineer processes How to use systems in ways that were never foreseen (or supported) by the original developers Combining hands-on work with technical overviews, this text helps you integrate security analysis into your technical computing curriculum. It will educate your students on security issues, such as side-channel attacks, and deepen their understanding of how computers and networks work.
Product Identifiers
Publisher
CRC Press LLC
ISBN-10
1439860718
ISBN-13
9781439860717
eBay Product ID (ePID)
99510344
Product Key Features
Number of Pages
320 Pages
Language
English
Publication Name
Introduction to Computer and Network Security : Navigating Shades of Gray
Publication Year
2013
Subject
Programming / Games, Security / Cryptography, Security / General, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Hardcover
Dimensions
Item Height
0.9 in
Item Weight
20.8 Oz
Item Length
9.5 in
Item Width
6.1 in
Additional Product Features
Intended Audience
College Audience
LCCN
2013-026150
Dewey Edition
23
Reviews
"... a comprehensive and adequately 'time-resistant' introduction to the field of computer and network security. ... interesting and useful. It could help the average technical reader acquire an adequate level of introductory knowledge on computer and network security." --Computers & Security, 46, 2014 "This definitive, comprehensive computer security textbook reflects Brooks's long-term study of this topic and his experience gained through teaching it. ... very well written, readily comprehensible, and thoroughly documented and annotated, and includes an extensive bibliography. ... Highly recommended." --E.M. Aupperle, Emeritus, University of Michigan, CHOICE Magazine, June 2014, "This definitive, comprehensive computer security textbook reflects Brooks's long-term study of this topic and his experience gained through teaching it. ... very well written, readily comprehensible, and thoroughly documented and annotated, and includes an extensive bibliography. ... Highly recommended." --E. M. Aupperle, emeritus, University of Michigan in CHOICE Magazine, June 2014
Illustrated
Yes
Dewey Decimal
005.8
Lc Classification Number
Qa76.9.A25
Table of Content
Brief History of Computers, Communications, and Security Pre-Renaissance Renaissance to World War I World War I World War II Cold War Organized Crime and Botnets Cyberwar Security and Privacy Overview Security Attributes Social Engineering Authentication and Authorization Access Permissions Audit User Interface Issues On Trusting Trust Taxonomy of Attacks Case Study--Mobile Code Case Study--Connected Vehicles Cryptography Primer Substitution Ciphers and Frequency Analysis Vignère Cipher and Cryptanalysis Block Ciphers RSA Public Key Cryptography Hash Functions One-Time Pads Key Management Message Confidentiality Steganography Obfuscation and Homomorphic Encryption SSL/TLS--Case Study Project Cryptographic Protocol Verification DNS and Routing X.509 and SSL Certificates Security Flaws With Certificates Man-in-the-Middle Attacks Implementation Flaws Usability Securing Networks Firewalls Virtual Private Networks (VPNs) Wireless Security Intrusion Detection Systems (IDS) Denial of Service Virtual Private Network--Case Study Project Laboratory Preparation Assignment Virtual Machine (VM) Use Sniffer Use VPN Installation Insertion Attacks SQL Injection Buffer Overflow Attack Printer Format Vulnerability SSH Insertion Attacks IDS Insertion Attacks Viruses Worms Virus and Worm Propagation Buffer Overflow--Case Study Project Stack Smashing Heap Smashing Arc Injection Pointer Clobbering Countermeasures Polymorphic Virus--Advanced Case Study Project Virus Basics Antivirus Pseudovirus with Alternate Data Streams Simple Virus--Timid Infection Spreading Self-Modifying Code Simple Polymorphism Packing and Encryption Frankenstein Viruses Web Security Cross Site Scripting (XSS) Cross Site Request Forgery (XSRF, CSRF) Man-in-the-Browser Penetration Testing Privacy and Anonymity Anonymity Metrics Anonymity Tools Computer Forensics Tools Privacy Laws Privacy Discussion Assignments--Antonin Scalia Side-Channel Attacks Power Analysis Traffic Analysis Time Analysis Red-Black Separation Side-Channel Countermeasures Digital Rights Management and Copyright Copyright History Fair Use Creative Commons Digital Rights Management Digital Millennium Copyright Act The Darknet Patent Trolls Discussion Assignment--Business Case for DRM Discussion Assignment--Technical Case for DRM Security Economics Liability and EULAs Network Externalities Code Bloat Lemon Markets Software Engineering Macroeconomics and Game Theory Introduction Conclusions Bibliography Index Problems and a Glossary appear at the end of each chapter.
Copyright Date
2013
Item description from the seller
Seller assumes all responsibility for this listing.
eBay item number:364271485859
Postage and handling
Item location:
Sparks, Nevada, United States
Post to:
Albania, Andorra, Angola, Anguilla, Antigua and Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Azerbaijan Republic, Bahamas, Bahrain, Bangladesh, Belgium, Belize, Benin, Bermuda, Bhutan, Bolivia, Bosnia and Herzegovina, Botswana, Brunei Darussalam, Bulgaria, Burkina Faso, Burundi, Cambodia, Cameroon, Canada, Cape Verde Islands, Cayman Islands, Central African Republic, Chad, Chile, China, Colombia, Costa Rica, Cyprus, Czech Republic, Côte d'Ivoire (Ivory Coast), Democratic Republic of the Congo, Denmark, Djibouti, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Fiji, Finland, France, Gabon Republic, Gambia, Georgia, Germany, Ghana, Gibraltar, Greece, Greenland, Grenada, Guatemala, Guinea, Guyana, Haiti, Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Jamaica, Japan, Jordan, Kazakhstan, Kenya, Kiribati, Kuwait, Kyrgyzstan, Laos, Latvia, Lebanon, Lesotho, Liechtenstein, Lithuania, Luxembourg, Macau, Macedonia, Madagascar, Malawi, Malaysia, Maldives, Mali, Malta, Mauritania, Mauritius, Mexico, Moldova, Monaco, Mongolia, Montenegro, Montserrat, Morocco, Mozambique, Namibia, Nauru, Nepal, Netherlands, New Zealand, Nicaragua, Niger, Norway, Oman, Pakistan, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Qatar, Republic of Croatia, Republic of the Congo, Romania, Rwanda, Saint Kitts-Nevis, Saint Lucia, Saint Vincent and the Grenadines, San Marino, Saudi Arabia, Senegal, Serbia, Seychelles, Sierra Leone, Singapore, Slovakia, Slovenia, Solomon Islands, South Africa, South Korea, Spain, Sri Lanka, Suriname, Swaziland, Sweden, Switzerland, Taiwan, Tajikistan, Tanzania, Thailand, Togo, Tonga, Trinidad and Tobago, Tunisia, Turkey, Turkmenistan, Turks and Caicos Islands, Uganda, United Arab Emirates, United Kingdom, United States, Uruguay, Uzbekistan, Vanuatu, Vatican City State, Vietnam, Wallis and Futuna, Western Samoa, Yemen, Zambia, Zimbabwe
Excludes:
APO/FPO, Afghanistan, Alaska/Hawaii, Algeria, Barbados, Belarus, Brazil, French Guiana, French Polynesia, Guadeloupe, Guinea-Bissau, Iraq, Liberia, Libya, Martinique, New Caledonia, Nigeria, Reunion, Russian Federation, US Protectorates, Ukraine, Venezuela
Postage and handling | To | Service | Delivery*See Delivery notes |
---|---|---|---|
Free postage | United States | Standard Shipping | Estimated between Fri, 28 Jun and Wed, 3 Jul to 43230 |
US $5.50 (approx S$ 7.45) | United States | Expedited Shipping | Estimated between Fri, 28 Jun and Wed, 3 Jul to 43230 |
Handling time |
---|
Will usually post within 2 business days of receiving cleared payment. |
Taxes |
---|
Seller charges sales tax in |
Sales Tax for an item #364271485859
Sales Tax for an item #364271485859
Seller collects sales tax for items shipped to the following states:
State | Sales Tax Rate |
---|
Return policy
After receiving the item, contact seller within | Refund will be given as |
---|---|
30 days after the buyer receives it | Money Back |
The buyer is responsible for return postage costs.
Seller feedback (463,465)
g***6 (79)- Feedback left by buyer.
Past month
Verified purchase
wonderful
r***h (19)- Feedback left by buyer.
Past month
Verified purchase
Was a gift. I didn't listen to them.
n***e (430)- Feedback left by buyer.
Past month
Verified purchase
Looks good. Thank you.