Analyzing computer security : a threat/vulnerability/countermeasure approach
By: Pfleeger, Charles P
Title By: Pfleeger, Shari Lawrence
Publisher: Upper Saddle River, NJ : Prentice Hall, c2012.Description: xxxvi, 799 p. : ill. ; 24 cm.ISBN: 9780132789462Program: CSCI262Subject(s): Computer security | Data protectionDDC classification: 005.8 PF AN Online resources: Location MapItem type | Home library | Call number | Status | Date due | Barcode | Item holds | Course reserves |
---|---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 005.8 PF AN (Browse shelf) | Available | T0064777 |
Total holds: 0
, Shelving location: Main Collection Close shelf browser
005.8 PE IN Information security policies, procedures, and standards : | 005.8 PE IN Information security risk analysis / | 005.8 PE IN Information security risk analysis / | 005.8 PF AN Analyzing computer security : | 005.8 PF SE Security in computing / | 005.8 PF SE Security in computing / | 005.8 PF SE Security in computing |
Security blanket or security theater? --
Knock, knock. Who's there? --
2 + 2 = 5 --
A horse of a different color --
The keys to the kingdom --
My cup runneth over --
He who steals my purse --
The root of all evil --
Scanning the horizon --
Do you hear what I hear? --
I hear you loud and clear --
Disregard that man behind the curtain --
Not all is as it seems --
Play it [again] Sam, or, let's look at the instant replay --
I can't get no satisfaction --
'Twas brillig, and the slithy toves --
Peering through the window --
My 100,000 nearest and dearest friends.
CSCI262