Skip to search
Skip to main content
Catalog
Help
Feedback
Your Account
Library Account
Bookmarks
(
0
)
Search History
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Security in computing / Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies.
Author
Pfleeger, Charles P., 1948-
[Browse]
Format
Book
Language
English
Εdition
Fifth edition.
Published/Created
Upper Saddle River, NJ : Pearson 2015
©2015
Description
1 online resource (944 pages)
Details
Subject(s)
Computer security
[Browse]
Data protection
[Browse]
Privacy, Right of.
[Browse]
Author
Pfleeger, Shari Lawrence
[Browse]
Margulies, Jonathan
[Browse]
Summary note
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems.
Copyright note
Copyright © 2015 Pearson Education, Inc. $g 2015
Issuing body
Made available through: Safari, an O’Reilly Media Company.
Source of description
Online resource; Title from title page (viewed January 26, 2015)
ISBN
9780134085050
Other standard number
40024607814
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Supplementary Information