COMPUTER SECURITY: PRINCIPLES AND PRACTICE 4/E (GE)

NT $ 1,568


Forcoursesincomputer/networksecurity
Balancingprincipleandpractice—anupdatedsurveyofthefast-movingworldofcomputerandnetworksecurity

ComputerSecurity:PrinciplesandPractice,4thEdition,isidealforcoursesinComputer/NetworkSecurity.Theneedforeducationincomputersecurityandrelatedtopicscontinuestogrowatadramaticrate—andisessentialforanyonestudyingComputerScienceorComputerEngineering.Writtenforbothanacademicandprofessionalaudience,the4thEditioncontinuestosetthestandardforcomputersecuritywithabalancedpresentationofprinciplesandpractice.Theneweditioncapturesthemostup-to-dateinnovationsandimprovementswhilemaintainingbroadandcomprehensivecoverageoftheentirefield.Theextensiveofferingofprojectsprovidesstudentswithhands-onexperiencetoreinforceconceptsfromthetext.Therangeofsupplementalonlineresourcesforinstructorsprovidesadditionalteachingsupportforthisfast-movingsubject.

TheneweditioncoversallsecuritytopicsconsideredCoreintheACM/IEEEComputerScienceCurricula2013,aswellassubjectareasforCISSP(CertifiedInformationSystemsSecurityProfessional)certification.ThistextbookcanbeusedtoprepforCISSPCertificationandisoftenreferredtoasthe‘goldstandard’whenitcomestoinformationsecuritycertification.Thetextprovidesin-depthcoverageofComputerSecurity,TechnologyandPrinciples,SoftwareSecurity,ManagementIssues,CryptographicAlgorithms,InternetSecurityandmore.

Contentupdates
.DatacentersecuritydiscussioninChapter5coversdatacentersecurityandtheTIA-492specificationofreliabilitytiers.
.MalwarematerialinChapter6includesadditionalmaterialonmacrovirusesandtheirstructure,astheyarenowthemostcommonformofvirusmalware.
.VirtualizationsecuritymaterialinChapter12hasbeenextended,giventherisinguseofsuchsystemsbyorganizationsandincloudcomputingenvironments.Adiscussionofvirtualfirewalls,whichmaybeusedtohelpsecuretheseenvironments,hasalsobeenadded.
.CloudsecuritydiscussioninChapter13includesanintroductiontocloudcomputing,keycloudsecurityconcepts,ananalysisofapproachestocloudsecurity,andanopen-sourceexample.
.IoTsecurityindiscussionChapter13coverssecurityfortheInternetofThings(IoT).ThediscussionincludesanintroductiontoIoT,anoverviewofIoTsecurityissues,andanopen-sourceexample.
.SEIMdiscussioninChapter18isupdatedforSecurityInformationandEventManagement(SIEM)Systems.
.PrivacysectioncoversprivacyissuesanditsmanagementinChapter19.Thesectionhasbeenextendedwithadditionaldiscussionofmoralandlegalapproaches,andtheprivacyissuesrelatedtobigdata.
.Authenticatedencryptionhasbecomeanincreasinglywidespreadcryptographictoolinavarietyofapplicationsandprotocols.Chapter21includesanewdiscussionofauthenticateddescriptionanddescribesanimportantauthenticatedencryptionalgorithmknownasoffsetcodebook(OCB)mode.


GOLDSTANDARD SIEM COMPUTERSECURITY IOT GE NETWORKSECURITY COMPUTER SECURITY PRACTICE