skip to content
Analyzing computer security : a threat/vulnerability/countermeasure approach Preview this item
ClosePreview this item
Checking...

Analyzing computer security : a threat/vulnerability/countermeasure approach

Author: Charles P Pfleeger; Shari Lawrence Pfleeger
Publisher: Upper Saddle River, NJ : Prentice Hall, ©2012.
Edition/Format:   Print book : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Charles P Pfleeger; Shari Lawrence Pfleeger
ISBN: 9780132789462 0132789469
OCLC Number: 712114592
Description: xxxvi, 799 pages : illustrations ; 24 cm
Contents: Security blanket or security theater? --
Knock, knock. Who's there? --
2 + 2 = 5 --
A horse of a different color --
The keys to the kingdom --
My cup runneth over --
He who steals my purse --
The root of all evil --
Scanning the horizon --
Do you hear what I hear? --
I hear you loud and clear --
Disregard that man behind the curtain --
Not all is as it seems --
Play it [again] Sam, or, let's look at the instant replay --
I can't get no satisfaction --
'Twas brillig, and the slithy toves --
Peering through the window --
My 100,000 nearest and dearest friends.
Responsibility: Charles P. Pfleeger, Shari Lawrence Pfleeger.

Reviews

Editorial reviews

Publisher Synopsis

"This is a must-read book for any budding Security Architect and also makes a great professional reference. I'd recommend this book to any IT architect or specialist wishing to enter the field of Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(2)

User lists with this item (3)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/712114592> # Analyzing computer security : a threat/vulnerability/countermeasure approach
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "712114592" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/865549794#Place/upper_saddle_river_nj> ; # Upper Saddle River, NJ
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/40554650> ; # Shari Lawrence Pfleeger
    schema:copyrightYear "2012" ;
    schema:creator <http://viaf.org/viaf/110454396> ; # Charles P. Pfleeger
    schema:datePublished "2012" ;
    schema:description "Security blanket or security theater? -- Knock, knock. Who's there? -- 2 + 2 = 5 -- A horse of a different color -- The keys to the kingdom -- My cup runneth over -- He who steals my purse -- The root of all evil -- Scanning the horizon -- Do you hear what I hear? -- I hear you loud and clear -- Disregard that man behind the curtain -- Not all is as it seems -- Play it [again] Sam, or, let's look at the instant replay -- I can't get no satisfaction -- 'Twas brillig, and the slithy toves -- Peering through the window -- My 100,000 nearest and dearest friends."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/865549794> ;
    schema:inLanguage "en" ;
    schema:name "Analyzing computer security : a threat/vulnerability/countermeasure approach"@en ;
    schema:productID "712114592" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/712114592#PublicationEvent/upper_saddle_river_nj_prentice_hall_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/865549794#Agent/prentice_hall> ; # Prentice Hall
    schema:workExample <http://worldcat.org/isbn/9780132789462> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/712114592> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/865549794#Agent/prentice_hall> # Prentice Hall
    a bgn:Agent ;
    schema:name "Prentice Hall" ;
    .

<http://experiment.worldcat.org/entity/work/data/865549794#Place/upper_saddle_river_nj> # Upper Saddle River, NJ
    a schema:Place ;
    schema:name "Upper Saddle River, NJ" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://viaf.org/viaf/110454396> # Charles P. Pfleeger
    a schema:Person ;
    schema:birthDate "1948" ;
    schema:familyName "Pfleeger" ;
    schema:givenName "Charles P." ;
    schema:name "Charles P. Pfleeger" ;
    .

<http://viaf.org/viaf/40554650> # Shari Lawrence Pfleeger
    a schema:Person ;
    schema:familyName "Pfleeger" ;
    schema:givenName "Shari Lawrence" ;
    schema:name "Shari Lawrence Pfleeger" ;
    .

<http://worldcat.org/isbn/9780132789462>
    a schema:ProductModel ;
    schema:isbn "0132789469" ;
    schema:isbn "9780132789462" ;
    .

<http://www.worldcat.org/title/-/oclc/712114592>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/712114592> ; # Analyzing computer security : a threat/vulnerability/countermeasure approach
    schema:dateModified "2018-01-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.