LEADER 04084nam 22005655 450 001 9911020429303321 005 20250809130214.0 010 $a3-031-88142-7 024 7 $a10.1007/978-3-031-88142-8 035 $a(MiAaPQ)EBC32257037 035 $a(Au-PeEL)EBL32257037 035 $a(CKB)40158917400041 035 $a(DE-He213)978-3-031-88142-8 035 $a(EXLCZ)9940158917400041 100 $a20250809d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Computer Security Workbook $eA Course Companion Resource /$fby Juan Tapiador 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (205 pages) 225 1 $aUndergraduate Topics in Computer Science,$x2197-1781 311 08$a3-031-88141-9 327 $a1. Computer Security Concepts -- 2. Authentication -- 3. Access Control -- 4. TCP/IP Security -- 5. Firewalls and Intrusion Detection Systems -- 6. Transport Layer Security -- 7. Vulnerabilities and Attacks -- 8. Malware. 330 $aMastering computer security requires more than just technical knowledge of software, systems and networks?it demands analytical thinking, a problem-solving mindset, and creative reasoning. These skills are best cultivated through practical challenges and structured problem-solving. This book presents a collection of questions and problems on a wide range of topics typically taught in introductory computer security courses, including basic concepts and principles, authentication techniques, access control models and methods, network security, software vulnerabilities, and malware. Topics and features: The exercises range in complexity to ensure progressive skill development?from foundational knowledge (e.g., defining and understanding basic security ideas and principles) to more advanced problem-solving (e.g., applying knowledge to analyze a security protocol, synthesizing concepts, making judgments about a design, or creating solutions). Each exercise is accompanied by a solution intended to serve as a learning aid and facilitate self-assessment. Some solutions include historical notes and additional references that could be useful to readers who are willing to explore a subject in more depth. The problems include practical scenarios and real-world cases, ensuring that readers understand how principles are applied in practice. The content is organized into sections and chapters that are mostly self-contained, so readers can explore them in any order. The material is flexible and can be adapted for various courses and audiences, allowing instructors and learners to select topics based on their needs. This unique textbook/reference offers broad appeal: The exercises are intended to complement other learning materials and are tailored to different skill levels, allowing beginners to build a strong foundation while offering advanced challenges to more experienced learners. Juan Tapiador is Full Professor in the Department of Computer Science and Engineering at the Universidad Carlos III de Madrid, Spain. 410 0$aUndergraduate Topics in Computer Science,$x2197-1781 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputer science 606 $aData and Information Security 606 $aMobile and Network Security 606 $aComputer Science Logic and Foundations of Programming 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aComputer Science Logic and Foundations of Programming. 676 $a005.8076 700 $aTapiador$b Juan$01841768 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911020429303321 996 $aThe Computer Security Workbook$94421612 997 $aUNINA