![]() |
Security in Computing, 6th Edition - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: E-Books (https://softwarez.info/Forum-E-Books) +--- Thread: Security in Computing, 6th Edition (/Thread-Security-in-Computing-6th-Edition--393491) |
Security in Computing, 6th Edition - BaDshaH - 02-24-2024 ![]() Security in Computing, 6th Edition English | August 5th, 2023 | ISBN: 0137891210 | 1029 pages | True PDF | 12.64 MB "A useful aid to understanding today's headlines as well as Israel's recent past." -Kirkus Review Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). • Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types • The security practitioner's toolbox: Identification and authentication, access control, and cryptography • Areas of practice: Securing programs, userinternet interaction, operating systems, networks, data, databases, and cloud computing • Cross-cutting disciplines: Privacy, management, law, and ethics • Using cryptography: Formal and mathematical underpinnings, and applications of cryptography • Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing |