9780134085043-0134085043-Security in Computing

Security in Computing

ISBN-13: 9780134085043
ISBN-10: 0134085043
Edition: 5
Author: Charles Pfleeger, Shari Pfleeger, Jonathan Margulies
Publication date: 2015
Publisher: Pearson
Format: Hardcover 944 pages
FREE US shipping
Rent
35 days
from $12.05 USD
FREE shipping on RENTAL RETURNS
Buy

From $29.10

Rent

From $12.05

Book details

ISBN-13: 9780134085043
ISBN-10: 0134085043
Edition: 5
Author: Charles Pfleeger, Shari Pfleeger, Jonathan Margulies
Publication date: 2015
Publisher: Pearson
Format: Hardcover 944 pages

Summary

Security in Computing (ISBN-13: 9780134085043 and ISBN-10: 0134085043), written by authors Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, was published by Pearson in 2015. With an overall rating of 4.1 stars, it's a notable title among other Network Security (Security & Encryption, Cloud Computing, Networking & Cloud Computing) books. You can easily purchase or rent Security in Computing (Hardcover, Used) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $12.51.

Description

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare

Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.

Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.

Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.

You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.

New coverage includes

  • A full chapter on securing cloud environments and managing their unique risks
  • Extensive new coverage of security issues associated with user—web interaction
  • New risks and techniques for safeguarding the Internet of Things
  • A new primer on threats to privacy and how to guard it
  • An assessment of computers and cyberwarfare–recent attacks and emerging risks
  • Security flaws and risks associated with electronic voting systems
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book