Security in Computing | 6 Edition

ISBN-13: 9780137891214
the top textbook retailers.
View all Prices by Retailer
Details about Security in Computing:
Pearson+ gives you access to much more than your eTextbook. Most titles also include audiobooks, study notes, flashcards and more to help you thrive in the classroom.
The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing
Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core principles associated with modern security policies, processes, and protection; illustrates them with up-to-date sidebars and examples; and shows how to apply them in practice. Modular and flexibly organized, it supports a wide array of courses, strengthens professionals' knowledge of foundational principles; and imparts a more expansive understanding of modern security.
This edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; offensive cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is mapped to two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Body of Knowledge (CyBOK).
- Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types
- The security practitioner's toolbox: Identification, authentication, access control, and encryption
- Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing
- Cross-cutting disciplines: Privacy, management, law, and ethics
- Using cryptography: Solve real problems, and explore its formal and mathematical underpinnings
- Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, computer-assisted offensive warfare, and quantum computing