9781733003902-1733003908-Computer Security: A Hands-on Approach

Computer Security: A Hands-on Approach

ISBN-13: 9781733003902
ISBN-10: 1733003908
Edition: 2nd ed.
Author: Wenliang Du
Publication date: 2019
Publisher: Wenliang Du
Format: Paperback 440 pages
FREE US shipping
Rent
35 days
from $13.39 USD
FREE shipping on RENTAL RETURNS
Buy

From $36.06

Rent

From $13.39

Book details

ISBN-13: 9781733003902
ISBN-10: 1733003908
Edition: 2nd ed.
Author: Wenliang Du
Publication date: 2019
Publisher: Wenliang Du
Format: Paperback 440 pages

Summary

Computer Security: A Hands-on Approach (ISBN-13: 9781733003902 and ISBN-10: 1733003908), written by authors Wenliang Du, was published by Wenliang Du in 2019. With an overall rating of 4.2 stars, it's a notable title among other Hacking (Security & Encryption, Encryption, Cryptography, Internet & Social Media) books. You can easily purchase or rent Computer Security: A Hands-on Approach (Paperback, Used) from BooksRun, along with many other new and used Hacking books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $17.8.

Description

This book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition". It is created to lower the cost on students, as many courses only need this part. It covers 17 of the 26 chapters.

Teaching computer security principles via hands-on activities
Unique among computer security texts, the Second Edition of the Computer Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.

Topics covered in the book
- Attacks on Software Applications
- Attacks on Web Applications
- Attacks on Hardware (CPUs): Meltdown and Spectre Attacks
- Cryptography and PKI
- Common Hacking and Defense Mechanisms

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book