System assurance beyond detecting vulnerabilities
Material type:
TextPublication details: Burlington, MA ; Mergan Kaufanaun ; 2011Description: xix, 346 p. : ill; Includes indexISBN: - 978-0-12-3814141-2
- C 005.8 M31s
| Item type | Current library | Call number | Status | Barcode | |
|---|---|---|---|---|---|
|
|
PCC CIRCULATION | C 005.8 M31s (Browse shelf(Opens below)) | Available | 5174 |
Browsing PCC shelves, Shelving location: CIRCULATION Close shelf browser (Hides shelf browser)
| C 005.8 F32h How to do everything to fight spam, viruses, pop-ups and spyware | C 005.8 G78c COH: Certified ethical hacker study guide | C 005.8 H22c Computer virus FAQ | C 005.8 M31s System assurance beyond detecting vulnerabilities | C 005.8 R13c Computer incident response and product security | C 005.8 St9c Cryptography and network security: principles and practice | C 005.8 Sta9c computer security principles and practice |
System assurance is a bit like detective work: Most of the time is spent out in the streets gathering evidence-interviewing potential witnesses or searching for a promising cigarette butt. Gathering evidence is important. The evidence contri-butes to understanding the situation (facts of the matter). Evidence drives the investigation (follow the facts). Remember, some detective time is spent on planning the investigative actions. Finally evidence is used to present the case in front of the judge and the jury.
There are no comments on this title.