Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Elements of Computer Security (Undergraduate Topics in Computer Science)

Buy

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors.

Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises.

Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.

(HTML tags aren't allowed.)

Practical PHP and MySQL(R): Building Eight Dynamic Web Applications (Negus Live Linux Series)
Practical PHP and MySQL(R): Building Eight Dynamic Web Applications (Negus Live Linux Series)
Everyone is going nuts about the Web. Ever since we started getting creaky old modems installed in our homes and businesses, the Web has become an increasingly dominant part of our lives. With it we explore, shop, diagnose, entertain, amuse, communicate, collaborate, and more. The Web is no longer a novelty item that the few use to stretch their...
Transgenics in Endocrinology (Contemporary Endocrinology)
Transgenics in Endocrinology (Contemporary Endocrinology)

A panel of expert clinical and basic investigators summarize the state-of-the-art in the use of transgenic technology in a broad range of endocrinological applications. Up-to-date and comprehensive, Transgenics in Endocrinology reviews the most recent developments in the analysis of endocrine physiology and its pathologies through mouse...

High Performance SQL Server: The Go Faster Book
High Performance SQL Server: The Go Faster Book
Design and configure SQL Server instances and databases in support of high-throughput applications that are mission-critical and provide consistent response times in the face of variations in user numbers and query volumes. Learn to configure SQL Server and design your databases to support a given instance and workload. You'll learn...

Advanced SharePoint Services Solutions
Advanced SharePoint Services Solutions

This book will cover advanced techniques for programming web parts and SharePoint Services. It will also cover advanced integration techniques with related products such as BizTalk Server 2004 and Content Server. Intended for advanced developers who already know all of the basic SharePoint Services, this book will aid them as they solve...

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
ARM-based Microcontroller Projects Using mbed
ARM-based Microcontroller Projects Using mbed

ARM-based Microcontroller Projects Using mbed gives readers a good understanding of the basic architecture and programming of ARM-based microcontrollers using ARM’s mbed software. The book presents the technology through a project-based approach with clearly structured sections that enable readers to use or modify them...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy