Security in Computing

by Charles P. Pfleeger

Security in Computing




Related Textbooks


Recent Blog Posts

Best Student Reads For 2020
How To Save Money On Textbooks
My First Love
Study Tips For College Students
Budgeting Tips For Students

Other Links

Most Popular Textbooks
Most Popular High School Textbooks
Most Popular Associates Textbooks
Most Popular Bachelors Textbooks
Most Popular Masters Textbooks
Most Popular Doctoral Textbooks
Most Popular Vocational Textbooks
ISBN-10 / ISBN-13B00S88TJV2 / 978B00S88TJV0
Edition5
AuthorCharles P. Pfleeger
PublisherPrentice Hall (on 2015-01-14)
Binding TypeKindle Edition
Number Of Pages941
User Ratings
(No ratings yet)
This book has been found by 177 other users. Do you have this book? Trade it in for cash!
This textbook is primarily used in: (16 total votes)
High school courses6.25% (1 votes)
Associates programs6.25% (1 votes)
Bachelors programs81.25% (13 votes)
Masters programs6.25% (1 votes)
Product Description

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare

 

Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.

 

Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.

 

Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.

 

You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.

 

New coverage includes

  • A full chapter on securing cloud environments and managing their unique risks
  • Extensive new coverage of security issues associated with user—web interaction
  • New risks and techniques for safeguarding the Internet of Things
  • A new primer on threats to privacy and how to guard it
  • An assessment of computers and cyberwarfare–recent attacks and emerging risks
  • Security flaws and risks associated with electronic voting systems

 

Amazon Reviews



Details compiled in 6.8869 seconds.

Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Textbooknova.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com

CERTAIN CONTENT THAT APPEARS ON TEXTBOOKNOVA.COM COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.