This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.
This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.
Topics and features:
Explores the full range of security risks and vulnerabilities in all connected digital systemsInspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systemsRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityDescribes the fundamentals of traditional computer network security, and common threats to securityReviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systemsDiscusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchainPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions
This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.
Topics and features:
Explores the full range of security risks and vulnerabilities in all connected digital systemsInspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systemsRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityDescribes the fundamentals of traditional computer network security, and common threats to securityReviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systemsDiscusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchainPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions
This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
"The book offers relevant definitions in the field of security and computer networks ... . The book is definitively addressed to the general nonspecialist public; practitioners may be able to consult it for some definitions. ... It is, in my view, important to emphasize that all of the topics are covered in a merely definitional, descriptive way." (Carla Sánchez Aguilar, Computing Reviews, April, 2016)
"The book contains exercises and advanced exercises, along with relevant references, and comes with support materials for instructors ... making it useful for teaching courses on computer security. ... The exercises and projects are helpful for teaching. ... I believe the third edition will continue to receive praise from students, researchers, and practitioners. I strongly recommend it." (S. V. Nagaraj, Computing Reviews, August, 2015)
"The book contains exercises and advanced exercises, along with relevant references, and comes with support materials for instructors ... making it useful for teaching courses on computer security. ... The exercises and projects are helpful for teaching. ... I believe the third edition will continue to receive praise from students, researchers, and practitioners. I strongly recommend it." (S. V. Nagaraj, Computing Reviews, August, 2015)
From the reviews:
"This book focuses on educating readers on the security problems that are likely to be encountered. ... Overall, this is a well-written text that will provide readers with a solid foundation in information security. ... it would also be appropriate as an introductory text for practitioners entering the field and for providing background and business context of security-related business issues for nontechnical managers." (W. T. Neumann, ACM Computing Reviews, May, 2009)
"This excellent book by Joseph Migga Kizza is very welcome. The author steers ... to give a thorough, complete and very readable guide to the subject. ... the book is well structured and presented - offering the basis of a strong balanced course. ... stands by itself as a valuable guide. ... Who is it for? A very good core text for an undergraduate course in network security, and valuable for any IT professional needing to refresh his or her understanding in this area ... ." (Times Higher Education, Issue viii, December, 2009)
"This book focuses on educating readers on the security problems that are likely to be encountered. ... Overall, this is a well-written text that will provide readers with a solid foundation in information security. ... it would also be appropriate as an introductory text for practitioners entering the field and for providing background and business context of security-related business issues for nontechnical managers." (W. T. Neumann, ACM Computing Reviews, May, 2009)
"This excellent book by Joseph Migga Kizza is very welcome. The author steers ... to give a thorough, complete and very readable guide to the subject. ... the book is well structured and presented - offering the basis of a strong balanced course. ... stands by itself as a valuable guide. ... Who is it for? A very good core text for an undergraduate course in network security, and valuable for any IT professional needing to refresh his or her understanding in this area ... ." (Times Higher Education, Issue viii, December, 2009)