Elementary Information Security / (Record no. 40806)

MARC details
000 -LEADER
fixed length control field 04424nam a22002897a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231207110121.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231207b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781284153040
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number SMI
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Smith, Richard E.
240 ## - UNIFORM TITLE
Uniform title <a href="Elementary Information Security">Elementary Information Security</a>
245 ## - TITLE STATEMENT
Title Elementary Information Security /
Statement of responsibility, etc Richard E Smith.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Massachusetts :
Name of publisher, distributor, etc Jones & Bartlett Learning,
Date of publication, distribution, etc 2021.
300 ## - PHYSICAL DESCRIPTION
Extent xi, 708 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Richard E. Smith, PhD<br/>Dr. Rick Smith, Ph.D., CISSP, is a writer, educator, and consultant who operates the Cryptosmith consulting practice. Dr. Smith has over 30 years of experience with computing systems, half of which has focused on information security. Dr. Smith also teaches at the University of St. Thomas (Minnesota) and has taught at the University of Minnesota and Boston University.
505 ## - FORMATTED CONTENTS NOTE
Title Chapter 1 Security From the Ground Up<br/> Chapter 2 Controlling a Computer<br/> Chapter 3 Controlling Files<br/> Chapter 4 Sharing Files<br/> Chapter 5 Storing Files<br/> Chapter 6 Authenticating People<br/> Chapter 7 Encrypting Files<br/> Chapter 8 Secret and Public Keys<br/> Chapter 9 Encrypting Volumes<br/> Chapter 10 Connecting Computers<br/> Chapter 11 Networks of Networks<br/> Chapter 12 End-to-End Networking<br/> Chapter 13 Network Encryption<br/> Chapter 14 Internet Services and Email<br/> Chapter 15 The World Wide Web<br/> Appendix Abbreviations
520 ## - SUMMARY, ETC.
Summary, etc If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal textbook for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.<br/><br/>Designed to fulfill curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination. <br/><br/><br/>Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevan<br/>Increased focus on the security of mobile devices and technology<br/>NEW coverage on the internet of things (IOT<br/>Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher mode<br/>Updated Attack terminology describes attack vectors and attack spaces<br/>Premier Access contains the Cybersecurity Cloud Labs, providing a hands-on, immersive mock IT infrastructure that enables students to test their skills with realistic security scenarios within a Virtual Machine environment<br/>Ideal for the second-year undergraduate college or university course in Information Security. This course can be found in various departments including Computer Science, Information Technology, Criminology, and Forensics.<br/><br/>Signup for Email Updates<br/> <br/>About Us<br/>Ascend Learning<br/>Author's Corner<br/>Blog<br/>Brands & Partners<br/>Careers<br/>Resource Center<br/>Who We Are<br/>Support<br/>Accessibility<br/>Contact Us<br/>Customer Feedback<br/>Pay Your Invoice Online<br/>Returns<br/>Technical Support<br/>Products & Solutions<br/>ECSI<br/>EMS & Fire Products<br/>Recent Products<br/>Fisdap<br/>Inclusive Access<br/>LMS Integration<br/>Navigate<br/>Product Catalogs<br/>XML Sitemap<br/>Legal<br/>GDPR Notice<br/>Privacy Policy<br/>Privacy Policy CA<br/>Report Piracy<br/>Rights & Permissions<br/>Terms of Use
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Encryption
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element World Wide Web
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet Services and Email
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Storing
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Authenticating
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Text Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 07/12/2023   005.8 SMI 46855 07/12/2023 07/12/2023 Text Books

Powered by Koha