Condition - Very Good The item shows wear from consistent use, but it remains in good condition and functions properly. Item may arrive with damaged packaging or be repackaged. It may be marked, have identifying markings on it, or have minor cosmetic damage. It may also be missing some parts/accessories or bundled items.
Computer Security: A Hands-on Approach
This book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition". It is created to lower the cost on students, as many courses only need this part. It covers 17 of the 26 chapters.
Teaching computer security principles via hands-on activities Unique among computer security texts, the Second Edition of the Computer Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.
Topics covered in the book - Attacks on Software Applications - Attacks on Web Applications - Attacks on Hardware (CPUs): Meltdown and Spectre Attacks - Cryptography and PKI - Common Hacking and Defense Mechanisms