Amazon cover image
Image from Amazon.com
Image from Google Jackets

Elementary Information Security / Richard E Smith.

By: Material type: TextTextLanguage: English Publication details: Massachusetts : Jones & Bartlett Learning, 2021.Edition: 3rd edDescription: xi, 708 p. : ill. ; 24 cmISBN:
  • 9781284153040
Uniform titles:
  • Elementary Information Security
Subject(s): DDC classification:
  • 23 005.8 SMI
Contents:
Chapter 1 Security From the Ground Up Chapter 2 Controlling a Computer Chapter 3 Controlling Files Chapter 4 Sharing Files Chapter 5 Storing Files Chapter 6 Authenticating People Chapter 7 Encrypting Files Chapter 8 Secret and Public Keys Chapter 9 Encrypting Volumes Chapter 10 Connecting Computers Chapter 11 Networks of Networks Chapter 12 End-to-End Networking Chapter 13 Network Encryption Chapter 14 Internet Services and Email Chapter 15 The World Wide Web Appendix Abbreviations
Summary: If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal textbook for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems. Designed to fulfill curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination. Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevan Increased focus on the security of mobile devices and technology NEW coverage on the internet of things (IOT Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher mode Updated Attack terminology describes attack vectors and attack spaces Premier Access contains the Cybersecurity Cloud Labs, providing a hands-on, immersive mock IT infrastructure that enables students to test their skills with realistic security scenarios within a Virtual Machine environment Ideal for the second-year undergraduate college or university course in Information Security. This course can be found in various departments including Computer Science, Information Technology, Criminology, and Forensics. Signup for Email Updates About Us Ascend Learning Author's Corner Blog Brands & Partners Careers Resource Center Who We Are Support Accessibility Contact Us Customer Feedback Pay Your Invoice Online Returns Technical Support Products & Solutions ECSI EMS & Fire Products Recent Products Fisdap Inclusive Access LMS Integration Navigate Product Catalogs XML Sitemap Legal GDPR Notice Privacy Policy Privacy Policy CA Report Piracy Rights & Permissions Terms of Use
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Text Books Text Books CUTN Central Library Generalia Non-fiction 005.8 SMI (Browse shelf(Opens below)) Available 46855

Richard E. Smith, PhD
Dr. Rick Smith, Ph.D., CISSP, is a writer, educator, and consultant who operates the Cryptosmith consulting practice. Dr. Smith has over 30 years of experience with computing systems, half of which has focused on information security. Dr. Smith also teaches at the University of St. Thomas (Minnesota) and has taught at the University of Minnesota and Boston University.

Chapter 1 Security From the Ground Up
Chapter 2 Controlling a Computer
Chapter 3 Controlling Files
Chapter 4 Sharing Files
Chapter 5 Storing Files
Chapter 6 Authenticating People
Chapter 7 Encrypting Files
Chapter 8 Secret and Public Keys
Chapter 9 Encrypting Volumes
Chapter 10 Connecting Computers
Chapter 11 Networks of Networks
Chapter 12 End-to-End Networking
Chapter 13 Network Encryption
Chapter 14 Internet Services and Email
Chapter 15 The World Wide Web
Appendix Abbreviations

If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal textbook for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.

Designed to fulfill curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination.


Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevan
Increased focus on the security of mobile devices and technology
NEW coverage on the internet of things (IOT
Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher mode
Updated Attack terminology describes attack vectors and attack spaces
Premier Access contains the Cybersecurity Cloud Labs, providing a hands-on, immersive mock IT infrastructure that enables students to test their skills with realistic security scenarios within a Virtual Machine environment
Ideal for the second-year undergraduate college or university course in Information Security. This course can be found in various departments including Computer Science, Information Technology, Criminology, and Forensics.

Signup for Email Updates

About Us
Ascend Learning
Author's Corner
Blog
Brands & Partners
Careers
Resource Center
Who We Are
Support
Accessibility
Contact Us
Customer Feedback
Pay Your Invoice Online
Returns
Technical Support
Products & Solutions
ECSI
EMS & Fire Products
Recent Products
Fisdap
Inclusive Access
LMS Integration
Navigate
Product Catalogs
XML Sitemap
Legal
GDPR Notice
Privacy Policy
Privacy Policy CA
Report Piracy
Rights & Permissions
Terms of Use

There are no comments on this title.

to post a comment.

Powered by Koha