Security in Computing, 6th edition

Published by Addison-Wesley Professional (July 24, 2023) © 2024

  • Charles Pfleeger
  • Shari Lawrence Pfleeger
  • Lizzie Coles-Kemp
Products list

Access details

  • Digital eBook
  • Instant access
  • Available online, offline and via apps
  • Accessible through the VitalSource Bookshelf

Features

  • Using cryptography
  • Make highlights and notes
  • Listen as the Bookshelf reads to you
Products list

Details

  • A print copy
  • Free shipping

Features

  • Security practitioner's toolbox
  • Using cryptography
  • Up-to-date examples

This product is expected to ship within 5-7 business days for Australian customers.

Title overview

The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto

Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organised, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security.

This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK).

  • Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types
  • The security practitioner's toolbox: Identification and authentication, access control, and cryptography
  • Areas of practice: Securing programs, user-internet interaction, operating systems, networks, data, databases, and cloud computing
  • Cross-cutting disciplines: Privacy, management, law, and ethics
  • Using cryptography: Formal and mathematical underpinnings, and applications of cryptography
  • Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing.

Table of contents

  • Chapter 1: Introduction
  • Chapter 2: Toolbox: Authentication, Access Control, and Cryptography
  • Chapter 3: Programs and Programming
  • Chapter 4: The Internet - User Side
  • Chapter 5: Operating Systems
  • Chapter 6: Networks
  • Chapter 7: Data and Databases
  • Chapter 8: New Territory
  • Chapter 9: Privacy
  • Chapter 10: Management and Incidents
  • Chapter 11: Legal Issues and Ethics
  • Chapter 12: Details of Cryptography
  • Chapter 13: Emerging Topics

Need help?Get in touch