Book description
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare
Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.
Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.
Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.
You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.
New coverage includes
A full chapter on securing cloud environments and managing their unique risks
Extensive new coverage of security issues associated with user—web interaction
New risks and techniques for safeguarding the Internet of Things
A new primer on threats to privacy and how to guard it
An assessment of computers and cyberwarfare–recent attacks and emerging risks
Security flaws and risks associated with electronic voting systems
Table of contents
- Cover Page
- About This eBook
- Title Page
- Copyright Page
- Dedication Page
- Contents
- Foreword
- Preface
- Acknowledgments
- About the Authors
- 1. Introduction
- 2. Toolbox: Authentication, Access Control, and Cryptography
- 3. Programs and Programming
- 4. The Web—User Side
- 5. Operating Systems
-
6. Networks
- 6.1 Network Concepts
- Part I—War on Networks: Network Security Attacks
- 6.2 Threats to Network Communications
- 6.3 Wireless Network Security
- 6.4 Denial of Service
- 6.5 Distributed Denial-of-Service
- Part II—Strategic Defenses: Security Countermeasures
- 6.6 Cryptography in Network Security
- 6.7 Firewalls
- 6.8 Intrusion Detection and Prevention Systems
- 6.9 Network Management
- 6.10 Conclusion
- 6.11 Exercises
- 7. Databases
- 8. Cloud Computing
- 9. Privacy
- 10. Management and Incidents
-
11. Legal Issues and Ethics
- 11.1 Protecting Programs and Data
- 11.2 Information and the Law
- 11.3 Rights of Employees and Employers
- 11.4 Redress for Software Failures
- 11.5 Computer Crime
- 11.6 Ethical Issues in Computer Security
-
11.7 Incident Analysis with Ethics
- Situation I: Use of Computer Services
- Situation II: Privacy Rights
- Situation III: Denial of Service
- Situation IV: Ownership of Programs
- Situation V: Proprietary Resources
- Situation VI: Fraud
- Situation VII: Accuracy of Information
- Situation VIII: Ethics of Hacking or Cracking
- Situation IX: True Representation
- Conclusion of Computer Ethics
- Conclusion
- Exercises
- 12. Details of Cryptography
- 13. Emerging Topics
- Bibliography
- Index
- Code Snippets
Product information
- Title: Security in Computing
- Author(s):
- Release date: January 2015
- Publisher(s): Pearson
- ISBN: 9780134085074
You might also like
book
Security in Computing, 6th Edition
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to …
book
Security in Computing, Third Edition
The classic guide to information security—fully updated for the latest attacks and countermeasures Security in Computing, …
book
Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601), 6th Edition
Fully updated computer security essentials—mapped to the CompTIA Security+ SY0-601 exam Save 10% on any CompTIA …
audiobook
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated …