000 01308 a2200205 4500
999 _c37734
_d37734
001 nam a22 7a 4500
020 _a9780132789462
082 _a005.8 PF AN
100 _aPfleeger, Charles P.
_935712
245 _aAnalyzing computer security :
_ba threat/vulnerability/countermeasure approach
_cCharles P Pfleeger, Shari Lawrence Pfleeger
260 _aUpper Saddle River, NJ :
_bPrentice Hall,
_cc2012.
300 _axxxvi, 799 p. :
_bill. ;
_c24 cm.
505 _aSecurity blanket or security theater? -- Knock, knock. Who's there? -- 2 + 2 = 5 -- A horse of a different color -- The keys to the kingdom -- My cup runneth over -- He who steals my purse -- The root of all evil -- Scanning the horizon -- Do you hear what I hear? -- I hear you loud and clear -- Disregard that man behind the curtain -- Not all is as it seems -- Play it [again] Sam, or, let's look at the instant replay -- I can't get no satisfaction -- 'Twas brillig, and the slithy toves -- Peering through the window -- My 100,000 nearest and dearest friends.
526 _aCSCI262
650 _aComputer security
_9641
650 _a Data protection
_910592
700 _aPfleeger, Shari Lawrence
_935713
856 _uhttps://uowd.box.com/s/5vnk9zyu38eescpj5fjcd66tyw32exw9
_zLocation Map
942 _cREGULAR