Security in Computing
6th edition
Par : , , Formats :
- Paiement en ligne :
- Livraison à domicile ou en point Mondial Relay entre le 8 juillet et le 16 juilletCet article sera commandé chez un fournisseur et sera expédié 6 à 12 jours après la date de votre commande.
- Retrait Click and Collect en magasin gratuit
- Livraison à domicile ou en point Mondial Relay entre le 8 juillet et le 16 juillet
- Nombre de pages992
- PrésentationBroché
- FormatGrand Format
- Poids1.785 kg
- Dimensions18,0 cm × 23,3 cm × 5,3 cm
- ISBN978-0-13-789121-4
- EAN9780137891214
- Date de parution29/08/2023
- ÉditeurAddison-Wesley
Résumé
Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection ; illustrates them with up-to-date examples ; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools ; app and browser security ; security by design ; securing cloud, lot, and embedded systems ; privacy-enhancing technologies ; protecting vulnerable individuals and groups ; strengthening security culture ; cryptocurrencies and blockchain ; cyberwarfare ; post-quantum computing ; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks : the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts : Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types. The security practitioner's toolbox : Identification and authentication, access control, and cryptography. Areas of practice : Securing programs, user - internet interaction, operating systems, networks, data, databases, and cloud computing. Cross-cutting disciplines : Privacy, management, law, and ethics. Using cryptography : Formal and mathematical underpinnings, and applications of cryptography. Emerging topics and risks : Al and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing.
Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection ; illustrates them with up-to-date examples ; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools ; app and browser security ; security by design ; securing cloud, lot, and embedded systems ; privacy-enhancing technologies ; protecting vulnerable individuals and groups ; strengthening security culture ; cryptocurrencies and blockchain ; cyberwarfare ; post-quantum computing ; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks : the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts : Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types. The security practitioner's toolbox : Identification and authentication, access control, and cryptography. Areas of practice : Securing programs, user - internet interaction, operating systems, networks, data, databases, and cloud computing. Cross-cutting disciplines : Privacy, management, law, and ethics. Using cryptography : Formal and mathematical underpinnings, and applications of cryptography. Emerging topics and risks : Al and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing.