9781733003957-1733003959-Computer Security: A Hands-on Approach (Computer & Internet Security)

Computer Security: A Hands-on Approach (Computer & Internet Security)

ISBN-13: 9781733003957
ISBN-10: 1733003959
Edition: 3rd ed.
Author: Wenliang Du
Publication date: 2022
Publisher: Wenliang Du
Format: Paperback 543 pages
FREE US shipping
Rent
35 days
from $13.75 USD
FREE shipping on RENTAL RETURNS
Buy

From $34.79

Rent

From $13.75

Book details

ISBN-13: 9781733003957
ISBN-10: 1733003959
Edition: 3rd ed.
Author: Wenliang Du
Publication date: 2022
Publisher: Wenliang Du
Format: Paperback 543 pages

Summary

Computer Security: A Hands-on Approach (Computer & Internet Security) (ISBN-13: 9781733003957 and ISBN-10: 1733003959), written by authors Wenliang Du, was published by Wenliang Du in 2022. With an overall rating of 3.6 stars, it's a notable title among other Hacking (Security & Encryption, Encryption, Viruses, Cryptography, Internet & Social Media) books. You can easily purchase or rent Computer Security: A Hands-on Approach (Computer & Internet Security) (Paperback, Used) from BooksRun, along with many other new and used Hacking books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $14.96.

Description

Teaching computer security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author’s long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book
- Software vulnerabilities, attacks, and countermeasures
- Attacks on web applications, countermeasures
- Attacks on hardware: Meltdown and Spectre attacks
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure (PKI)
- Common hacking and defense techniques

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book