The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect todays newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. Youll start by mastering the fields basic terms, principles, and concepts. Next, youll apply these basics in diverse situations and environments, learning to think like an attacker and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, youll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with userweb interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfarerecent attacks and emerging risks Security flaws and risks associated with electronic voting systems
Chapter 1: Introduction Chapter 2: Toolbox: Authentication, Access Control, and Cryptography Chapter 3: Programs and Programming Chapter 4: The Web-User Side Chapter 5: Operating Systems Chapter 6: Networks Chapter 7: Databases Chapter 8: Cloud Computing Chapter 9: Privacy Chapter 10: Management and Incidents Chapter 11: Legal Issues and Ethics Chapter 12: Details of Cryptography Chapter 13: Emerging Topics Bibliography Index
Accessing your eBook through Kortext
Once purchased, you can view your eBook through the Kortext app, available to download for Windows, Android and iOS devices. Once you have downloaded the app, your eBook will be available on your Kortext digital bookshelf and can even be downloaded to view offline anytime, anywhere, helping you learn without limits.
In addition, you'll have access to Kortext's smart study tools including highlighting, notetaking, copy and paste, and easy reference export.
To download the Kortext app, head to your device's app store or visit https://app.kortext.com to sign up and read through your browser.
NB: eBook is only available for a single-user licence (i.e. not for multiple / networked users).