ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Networking / Vendor Specific

Security in Computing

| £79.99 | €89.96 | Ca$129.77 | Au$128.07
by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies
What is this?DRM-EPUB by download  |  $96.00
What is this?DRM-PDF by download  |  $96.00
add to wish list
Security in Computing by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare

Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends.

Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.

Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.

You'll start by mastering the field's basic terms, principles, and concepts. Next, you'll apply these basics in diverse situations and environments, learning to "think like an attacker" and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you'll go beyond technology to understand crucial management issues in protecting infrastructure and data.

New coverage includes

  • A full chapter on securing cloud environments and managing their unique risks
  • Extensive new coverage of security issues associated with user—web interaction
  • New risks and techniques for safeguarding the Internet of Things
  • A new primer on threats to privacy and how to guard it
  • An assessment of computers and cyberwarfare–recent attacks and emerging risks
  • Security flaws and risks associated with electronic voting systems

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 673539

Ebook Details
Pages: 944
Size: 10.8 MB
Publisher: Prentice Hall
Date published:   2015
ISBN: 9780134085050 (DRM-EPUB)
9780134078564 (DRM-PDF)

DRM Settings
Copying:of 30 selections every 30 days allowed
Printing:of 30 pages every 30 days allowed
Read Aloud:  allowed

Territory Restrictions
This ebook will NOT be sold to customers with a billing address in:
Afghanistan, Algeria, Belarus, Bosnia and Herzegowina, Congo, Congo (The Democratic Republic of the), Cote D'Ivoire, Cuba, Indonesia, Iran (Islamic Republic of), Iraq, Korea (Democratic People's Republic of), Liberia, Libyan Arab Jamahiriya, Macedonia (The Former Yugoslav Republic of), Myanmar, Nigeria, Sudan, Syrian Arab Republic, Zimbabwe

This product is listed in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Networking > Vendor Specific

These authors have products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Networking > Vendor Specific

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016