In the name of Allah the Merciful

Security in Computing

6th Edition, Charles P. Pfleeger; Shari Lawrence Pfleeger; Lizzie Coles-Kemp, 0137891210, 978-0137891252, 9780137891252, 978-0137891214, 9780137891214, 978-0134085043, 9780134085043, 0134085043, B0C4V9R1HN

10 $

English | 2024 | EPUB, Converted PDF | 40 MB

number
type
  • {{value}}
wait a little

The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing

Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and  practicing information cybersecurity. It defines core principles  associated with modern security policies, processes, and protection;  illustrates them with up-to-date sidebars and examples; and shows how to  apply them in practice. Modular and flexibly organized, it supports a  wide array of courses, strengthens professionals' knowledge of  foundational principles; and imparts a more expansive understanding of  modern security.

This edition adds or expands  coverage of artificial intelligence and machine learning tools; app and  browser security; security by design; securing cloud, IoT, and embedded  systems; privacy-enhancing technologies; protecting vulnerable  individuals and groups; strengthening security culture; cryptocurrencies  and blockchain; offensive cyberwarfare; post-quantum computing; and  more. It contains many new diagrams, exercises, sidebars, and examples,  and is mapped to two leading frameworks: the US NIST National Initiative  for Cybersecurity Education (NICE) and the UK Cyber Body of Knowledge  (CyBOK).

  • Core  security concepts: Assets, threats, vulnerabilities, controls,  confidentiality, integrity, availability, attackers, and attack types
  • The security practitioner's toolbox: Identification, authentication, access control, and encryption
  • Areas  of practice: Securing programs, user–internet interaction, operating  systems, networks, data, databases, and cloud computing
  • Cross-cutting disciplines: Privacy, management, law, and ethics
  • Using cryptography: Solve real problems, and explore its formal and mathematical underpinnings
  • Emerging  topics and risks: AI and adaptive cybersecurity, blockchains and  cryptocurrencies, computer-assisted offensive warfare, and quantum  computing