Analyzing computer security : a threat/vulnerability/countermeasure approach /
Charles P. Pfleeger, Shari Lawrence Pfleeger.
- Upper Saddle River, NJ : Prentice Hall, c2012.
- xxxvi, 799 p. : ill. ; 24 cm.
Security Blanket or Security Theater? (Page-2), Knock, Knock. Who’s There? (Page-38), 2 + 2 = 5 (Page-72), A Horse of a Different Color (Page-130), The Keys to the Kingdom (Page-180), My Cup Runneth Over (Page-216), He Who Steals My Purse . . . (Page-276), The Root of All Evil (Page-332), Scanning the Horizon (Page-368), Do You Hear What I Hear? (Page-404), I Hear You Loud and Clear (Page-432), Disregard That Man Behind the Curtain (Page-482), Not All Is as It Seems(Page-524), Play It [Again] Sam, or, Let’s Look at the Instant Replay (Page-576), I Can’t Get No Satisfaction (Page-600), Twas Brillig, and the Slithy Toves . . .(Page-662), Peering through the Window (Page-676), My 100,000 Nearest and Dearest Friends (Page-706), Afterword (Page-738)