Description
Book Synopsis: Teaching computer security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author’s long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book:
- Software vulnerabilities, attacks, and countermeasures
- Attacks on web applications, countermeasures
- Attacks on hardware: Meltdown and Spectre attacks
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure (PKI)
- Common hacking and defense techniques
Read more
Details
Are you tired of reading dry, theoretical textbooks that hardly give you a real-world understanding of computer security? Say goodbye to boring lectures and embrace a hands-on approach with "Computer Security: A Hands-on Approach"! Unlike any other computer security text out there, this book takes you on a journey of discovery through interactive activities.
With a third edition that builds upon the author's extensive experience in teaching complex subjects, this book will empower you to truly grasp the principles of computer security. Instead of merely absorbing information passively, you get to actively engage with each security principle through a series of tangible, hands-on activities. Imagine being able to touch, play with, and experiment with the concepts you're learning. It's a game-changer!
What sets this book apart is the incorporation of the author's widely adopted SEED Labs. These labs have been utilized by more than 1000 institutes worldwide, enhancing the learning experience for countless students. Now, imagine being able to leverage the same labs and taking your understanding of computer security to new heights.
If that's not enough, the author has gone the extra mile by publishing online courses on Udemy that are based on this very book. So, not only will you have an exceptional learning resource in your hands, but you'll also have access to additional multimedia content that further enhances your understanding.
Dive into the world of software vulnerabilities, web application attacks, hardware vulnerabilities like Meltdown and Spectre attacks, cryptography, and much more. You'll also explore the fascinating realm of hacking and defense techniques, equipping yourself with valuable knowledge to stay one step ahead of cyber threats.
Don't settle for dull, unengaging content. Choose "Computer Security: A Hands-on Approach" and revolutionize your learning experience. Start your journey towards becoming a computer security expert today!
Click here to get your copy of "Computer Security: A Hands-on Approach" now!
Discover More Best Sellers in Internet & Social Media
Shop Internet & Social Media
The Hacker Playbook 3: Practical Guide To Penetration Testing
$13.14


$18.95


$14.95


Beginning MERN Stack: Build and Deploy a Full Stack MongoDB, Express, React, Node.js App
$19.56


The Kindness Games: How a Single Post Changed Our Mindset about Community
$17.99


The Anatomy of the Swipe: Making Money Move
$6.49


$33.53


Don't Make It Weird: The Entrepreneur's Guide to Being Human on the Internet
$9.99
