Corporate Computer Security, 5th edition
Published by Pearson (September 18, 2020) © 2021
- Randall J Boyle Weber State University
- Raymond R. Panko University of Hawaii
eTextbook
- Anytime, anywhere learning with the Pearson+ app
- Easy-to-use search, navigation and notebook
- Simpler studying with flashcards
For introductory courses in information security.
A technical and managerial guide to corporate computer security
Corporate Computer Security offers a solid technical understanding of security tools with a strong managerial focus. A practical guide to proactively defending corporate systems from attacks, the text includes coverage of the technical aspects of countermeasures.
The 5th Edition reflects today's rapidly changing IT industry. Additions include a new opening case, hands-on projects, and more content on data breaches. Updated news, business-focused, ethics and technical articles have also been added, while statistics, standards and laws are current throughout.
Hallmark features of this title
Fosters critical-thinking skills
- Test Your Understanding questions follow each section providing students with a concept comprehension checkpoint.
- Chapter-ending Integrative Thought questions require students to apply chapter material and synthesize what they've learned.
- Perspective Questions prompt students to reflect on what they've studied in each chapter and employ higher-level thinking in their analysis.
Provides connections to real-world issues
- Case Studies present students with real-life scenarios illustrating how concepts learned in each chapter could impact a corporation.
- Key findings from annual industry reports and discussion questions accompany each case study, offering students the opportunity to apply, analyze, and synthesize the material.
New and updated features of this title
Provides connections to real-world issues
- NEW: Security @ Work, Security Technology, and Security Ethics articles dive deeper into real-life issues, facilitate classroom discussions and in-class small group breakouts, and provide optional assignments.
- NEW: The opening case in Ch. 1 discusses the data breach at Target Corp, illustrating the real-world threat environment corporations face today and the impact of breaches.
- NEW and UPDATED: Hands-on Projects in each chapter give students experience using contemporary security software via projects directly related to the chapter material. This edition has 9 new, and many updated, hands-on projects.
Remains current with up-to-date information
- EXPANDED: Data breaches are covered more extensively, with a new section dedicated to looking at data breaches and new charts showing a timeline and size comparison for some of the largest breaches.
- EXPANDED: 4 to 5 In-The-News Articles appear after the first section in each chapter. These articles reference recent events to show the relevance of the chapter material as it relates to what is currently happening in the security industry.
- UPDATED: Statistics, standards, and laws have been updated throughout to reflect recent changes.
- The Threat Environment
- Planning and Policy
- Cryptography
- Secure Networks
- Access Control
- Firewalls
- Host Hardening
- Application Security
- Data Protection
- Incident and Disaster Response
- Module A. Networking Concepts
About our authors
Randall Boyle is an associate professor of management information systems, and Willard Eccles Fellow, at Weber State University in the Goddard School of Business and Economics. He received his Ph.D. in Management Information Systems from Florida State University in 2003. He also has a master's degree in Public Administration and a B.S. in Finance. His research areas include deception detection in computer-mediated environments, data breaches, secure information systems, the effects of IT on cognitive biases, and the effects of IT on knowledge workers. He has received college teaching awards at Weber State University, Longwood University, the University of Utah, and the University of Alabama in Huntsville. His teaching is primarily focused on management information systems, information security, and networking. He has authored several books including Using MIS, 11e, Experiencing MIS, 9e, Corporate Computer and Network Security, 5e, Applied Information Security, and Applied Networking Labs.
Ray Panko is Professor Emeritus of Information Technology Management at the University of Hawai`i's Shidler College of Business. His main courses are networking and security. Before coming to the university, he was a project manager at Stanford Research Institute (now SRI International), where he worked for Doug Englebart (the inventor of the mouse). He received his BS in Physics and his MBA from Seattle University. He received his doctorate from Stanford University, where his dissertation was conducted under contract to the Office of the President of the United States. He has been awarded the Shidler College of Business's Dennis Ching award as the outstanding teacher among senior faculty. He is also a Shidler Fellow.
Need help? Get in touch