Amazon cover image
Image from Amazon.com

Security in computing [Book] / Charles P. Pfleeger, Shari Lawrence Pfleeger.

By: Contributor(s): Material type: TextTextPublication details: Upper Saddle River, NJ : Prentice Hall, c2007.Edition: 4th edDescription: xxix, 845 p. : ill. ; 25 cmISBN:
  • 9788131727256
  • 9780132390774 (hardback : alk. paper)
Subject(s): DDC classification:
  • 004.6
Other classification:
  • 004.6
Summary: Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using the Advanced Encryption System (AES) more effectively Balancing dissemination with piracy control in music and other digital content Countering new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books COMSATS University Wah Campus Main 004.6 PFL 23231 (Browse shelf(Opens below)) Available 10004000023231
Total holds: 0

Include

Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation attacks Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using the Advanced Encryption System (AES) more effectively Balancing dissemination with piracy control in music and other digital content Countering new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit

All.

There are no comments on this title.

to post a comment.