MARC details
000 -LEADER |
fixed length control field |
04424nam a22002897a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231207110121.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
231207b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781284153040 |
041 ## - LANGUAGE CODE |
Language |
English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Classification number |
005.8 |
Item number |
SMI |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Smith, Richard E. |
240 ## - UNIFORM TITLE |
Uniform title |
<a href="Elementary Information Security">Elementary Information Security</a> |
245 ## - TITLE STATEMENT |
Title |
Elementary Information Security / |
Statement of responsibility, etc |
Richard E Smith. |
250 ## - EDITION STATEMENT |
Edition statement |
3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Massachusetts : |
Name of publisher, distributor, etc |
Jones & Bartlett Learning, |
Date of publication, distribution, etc |
2021. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xi, 708 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Richard E. Smith, PhD<br/>Dr. Rick Smith, Ph.D., CISSP, is a writer, educator, and consultant who operates the Cryptosmith consulting practice. Dr. Smith has over 30 years of experience with computing systems, half of which has focused on information security. Dr. Smith also teaches at the University of St. Thomas (Minnesota) and has taught at the University of Minnesota and Boston University. |
505 ## - FORMATTED CONTENTS NOTE |
Title |
Chapter 1 Security From the Ground Up<br/> Chapter 2 Controlling a Computer<br/> Chapter 3 Controlling Files<br/> Chapter 4 Sharing Files<br/> Chapter 5 Storing Files<br/> Chapter 6 Authenticating People<br/> Chapter 7 Encrypting Files<br/> Chapter 8 Secret and Public Keys<br/> Chapter 9 Encrypting Volumes<br/> Chapter 10 Connecting Computers<br/> Chapter 11 Networks of Networks<br/> Chapter 12 End-to-End Networking<br/> Chapter 13 Network Encryption<br/> Chapter 14 Internet Services and Email<br/> Chapter 15 The World Wide Web<br/> Appendix Abbreviations |
520 ## - SUMMARY, ETC. |
Summary, etc |
If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal textbook for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.<br/><br/>Designed to fulfill curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination. <br/><br/><br/>Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevan<br/>Increased focus on the security of mobile devices and technology<br/>NEW coverage on the internet of things (IOT<br/>Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher mode<br/>Updated Attack terminology describes attack vectors and attack spaces<br/>Premier Access contains the Cybersecurity Cloud Labs, providing a hands-on, immersive mock IT infrastructure that enables students to test their skills with realistic security scenarios within a Virtual Machine environment<br/>Ideal for the second-year undergraduate college or university course in Information Security. This course can be found in various departments including Computer Science, Information Technology, Criminology, and Forensics.<br/><br/>Signup for Email Updates<br/> <br/>About Us<br/>Ascend Learning<br/>Author's Corner<br/>Blog<br/>Brands & Partners<br/>Careers<br/>Resource Center<br/>Who We Are<br/>Support<br/>Accessibility<br/>Contact Us<br/>Customer Feedback<br/>Pay Your Invoice Online<br/>Returns<br/>Technical Support<br/>Products & Solutions<br/>ECSI<br/>EMS & Fire Products<br/>Recent Products<br/>Fisdap<br/>Inclusive Access<br/>LMS Integration<br/>Navigate<br/>Product Catalogs<br/>XML Sitemap<br/>Legal<br/>GDPR Notice<br/>Privacy Policy<br/>Privacy Policy CA<br/>Report Piracy<br/>Rights & Permissions<br/>Terms of Use |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Encryption |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
World Wide Web |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Internet Services and Email |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Storing |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Authenticating |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Text Books |