Softwarez.Info - Software's World!
Security in Computing, 6th Edition - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: E-Books (https://softwarez.info/Forum-E-Books)
+--- Thread: Security in Computing, 6th Edition (/Thread-Security-in-Computing-6th-Edition--393491)



Security in Computing, 6th Edition - BaDshaH - 02-24-2024

[Image: dbabd51f6eac8e63833f7a7053927cbc.jpg]
Security in Computing, 6th Edition

English | August 5th, 2023 | ISBN: 0137891210 | 1029 pages | True PDF | 12.64 MB

"A useful aid to understanding today's headlines as well as Israel's recent past." -Kirkus Review
Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security.

This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK).

• Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types
• The security practitioner's toolbox: Identification and authentication, access control, and cryptography
• Areas of practice: Securing programs, userinternet interaction, operating systems, networks, data, databases, and cloud computing
• Cross-cutting disciplines: Privacy, management, law, and ethics
• Using cryptography: Formal and mathematical underpinnings, and applications of cryptography
• Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing

[To see links please register or login]