Security in Computing, 6th edition
Published by Addison-Wesley Professional (November 30, 2023) © 2024
- Lizzie Coles-Kemp
- Charles Pfleeger
- Shari Lawrence Pfleeger
pay undefined one-time
Price Reduced From: $120.00
- A print text (hardcover or paperback)
Access Details
- Access courses online from any computer (PC or Mac) or tablet (Android or iOS)
- Native app available for mobile use; use online, or download and work offline; data syncs automaticallyÂ
- Purchase print or digital codes from your college bookstore, or printed access code cards here
Features
- Interactive learning elements throughout, including exercises, quizzes, flashcards, and video tutorials
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing
Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core principles associated with modern security policies, processes, and protection; illustrates them with up-to-date sidebars and examples; and shows how to apply them in practice. Modular and flexibly organized, it supports a wide array of courses, strengthens professionals' knowledge of foundational principles; and imparts a more expansive understanding of modern security.
This edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; offensive cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is mapped to two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Body of Knowledge (CyBOK).
- Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types
- The security practitioner's toolbox: Identification, authentication, access control, and encryption
- Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing
- Cross-cutting disciplines: Privacy, management, law, and ethics
- Using cryptography: Solve real problems, and explore its formal and mathematical underpinnings
- Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, computer-assisted offensive warfare, and quantum computing
Need help? Get in touch