Security in Computing

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security in Computing by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies ISBN: 9780134085050
Publisher: Pearson Education Publication: January 14, 2015
Imprint: Prentice Hall Language: English
Author: Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
ISBN: 9780134085050
Publisher: Pearson Education
Publication: January 14, 2015
Imprint: Prentice Hall
Language: English

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare

 

Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.

 

Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.

 

Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.

 

You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.

 

New coverage includes

  • A full chapter on securing cloud environments and managing their unique risks
  • Extensive new coverage of security issues associated with user—web interaction
  • New risks and techniques for safeguarding the Internet of Things
  • A new primer on threats to privacy and how to guard it
  • An assessment of computers and cyberwarfare–recent attacks and emerging risks
  • Security flaws and risks associated with electronic voting systems

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare

 

Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.

 

Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.

 

Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.

 

You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.

 

New coverage includes

 

More books from Pearson Education

Cover of the book Exam Ref 70-346 Managing Office 365 Identities and Requirements by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Leading with Restraint by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Your First Notebook PC by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Outsmart! by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book USB Explained by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Facebook Me! A Guide to Having Fun with Your Friends and Promoting Your Projects on Facebook by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book The Best of The Digital Photography Book Series by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book The Oslo Modeling Language by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Rapid Web Applications with TurboGears by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Sams Teach Yourself iPad in 10 Minutes by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Apple Training Series by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Encryption in a Windows Environment by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Law Express Question and Answer: Family Law by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Cover of the book Critical Thinking: Tools for Taking Charge of Your Professional and Personal Life by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy