9780137891214-0137891210-Security in Computing

Security in Computing

ISBN-13: 9780137891214
ISBN-10: 0137891210
Edition: 6
Author: Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp
Publication date: 2023
Publisher: Addison-Wesley Professional
Format: Paperback 1040 pages
FREE US shipping
Rent
35 days
from $87.28 USD
FREE shipping on RENTAL RETURNS
Buy

From $81.60

Rent

From $87.28

Book details

ISBN-13: 9780137891214
ISBN-10: 0137891210
Edition: 6
Author: Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp
Publication date: 2023
Publisher: Addison-Wesley Professional
Format: Paperback 1040 pages

Summary

Security in Computing (ISBN-13: 9780137891214 and ISBN-10: 0137891210), written by authors Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp, was published by Addison-Wesley Professional in 2023. With an overall rating of 3.5 stars, it's a notable title among other books. You can easily purchase or rent Security in Computing (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $38.18.

Description

The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto
Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security.
This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing
Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book