Book description
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing
Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core principles associated with modern security policies, processes, and protection; illustrates them with up-to-date sidebars and examples; and shows how to apply them in practice. Modular and flexibly organized, it supports a wide array of courses, strengthens professionals' knowledge of foundational principles; and imparts a more expansive understanding of modern security.
This edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; offensive cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is mapped to two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Body of Knowledge (CyBOK).
Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types
The security practitioner's toolbox: Identification, authentication, access control, and encryption
Areas of practice: Securing programs, userinternet interaction, operating systems, networks, data, databases, and cloud computing
Cross-cutting disciplines: Privacy, management, law, and ethics
Using cryptography: Solve real problems, and explore its formal and mathematical underpinnings
Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, computer-assisted offensive warfare, and quantum computing
.
Table of contents
- Cover Page
- About This eBook
- Halftitle Page
- Title Page
- Copyright Page
- Pearson’s Commitment to Diversity, Equity, and Inclusion
- Contents
- Foreword
- Preface
- Acknowledgments
- About the Authors
- 1. Introduction
- 2. Toolbox: Authentication, Access Control, and Cryptography
- 3. Programs and Programming
- 4. The Internet—User Side
- 5. Operating Systems
-
6. Networks
- 6.1 Network Concepts
- Part I—War on Networks: Network Security Attacks
- 6.2 Threats to Network Communications
- 6.3 Wireless Network Security
- 6.4 Denial of Service
- 6.5 Distributed Denial of Service
- Part II—Strategic Defenses: Security Countermeasures
- 6.6 Cryptography in Network Security
- 6.7 Firewalls
- 6.8 Intrusion Detection and Prevention Systems
- 6.9 Network Management
- 6.10 Conclusion
- 6.11 Exercises
- 7. Data and Databases
- 8. New Territory
- 9. Privacy
- 10. Management and Incidents
-
11. Legal Issues and Ethics
- 11.1 Protecting Programs and Data
- 11.2 Information and the Law
- 11.3 Rights of Employees and Employers
- 11.4 Redress for Software Failures
- 11.5 Computer Crime
- 11.6 Ethical Issues in Computer Security
- 11.7 An Ethical Dive into Artificial Intelligence
- 11.8 Incident Analyses with Ethics
- 11.9 Conclusion
- 11.10 Exercises
- 12. Details of Cryptography
- 13. Emerging Topics
- Bibliography
- Index
- Code Snippets
Product information
- Title: Security in Computing, 6th Edition
- Author(s):
- Release date: August 2023
- Publisher(s): Addison-Wesley Professional
- ISBN: 9780137891375
You might also like
book
Security in Computing
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of …
book
TCP/IP Illustrated, Volume 1: The Protocols, 2nd Edition
“For an engineer determined to refine and secure Internet operation or to explore alternative solutions to …
video
The Complete Cybersecurity Bootcamp, 2nd Edition
26 Hours of Video Instruction 26 Hours of Detailed, Curated Video Training to Take You from …
audiobook
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated …