Computer System Security: Basic Concepts and Solved Exercises is designed to expose students and others to the basic aspects of computer security. Written by leading experts and instructors, it covers
For courses in computer/network security Balancing principle and practice–an updated survey of the fast-moving world of computer and network security Computer Security: Principles and Practice, 4th Ed
Written by leading IT security educators, this fully updated lab manual supplements Principles of Computer Security, Fourth EditionPrinciples of Computer Security Lab Manual, Fourth Edition contains m
Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely
Karame and Androulaki share findings from five years of research into security and privacy issues surrounding Bitcoin, now the mostly widely used digital currency system. Writing mostly for computer s
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.Principles of Comput
For introductory courses in IT Security. A strong business focus through a solid technical presentation of security tools. Corporate Computer Security provides a strong business focus along w
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are
The first book to introduce computer architecture for security and provide the tools to implement secure computer systemsThis book provides the fundamentals of computer architecture for security. It c
A completely up-to-date resource on computer securityAssuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast to
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security expert
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern development
For courses in computer/network securityBalancing principle and practice―an updated survey of the fast-moving world of computer and network securityComputer Security: Principles and Practice, 4th Edit
Today, everyone recognizes the importance of safeguarding computer systems and networks from vulnerability, attack, and compromise. But computer security is neither an easy art nor a simple science: i
This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms
Today high volumes of spam not only waste resources and impede productivity, but also present severe threats to computer system security and personal privacy. This book introduces research on anti-spa
A comprehensive guide to the design and organization of modern computing systemsDigital Logic Design and Computer Organization with Computer Architecture for Security provides practicing engineers and
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This
"The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect
The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, la
Computer Network Security Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical s
With real-world examples that reflect today's most important and relevant security topics, Computer Security and Penetration Testing will address how and why people attack computers and networks so t
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they
This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descr
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This
A Sybex guide to Windows Security concepts, perfect for IT beginners Security is one of the most important components to every company's computer network. That's why the Security Fundamentals MTA Cert
The Personnel Security Clearance System—the process by which the federal government incorporates individuals into secret national-security work—is flawed. After?twenty-three?years of federal service,
This book studies typical issues regarding China’s financial security, such as internal and external currency security, herd behavior in bank credit, system risk in the stock market, major risks in th
DNS Security: Hacking and Defending the Domain Name System provides tactics on how to secure a Domain Name System (DNS) framework by exploring common DNS vulnerabilities using real-world examples of D
Drawing together the inter-related aspects of IT fundamentals, networking, platform technologies, management, human-computer interaction, administration and maintenance, security, system integration a
In recent years, the need for education in computer security and related topics has grown dramatically—and is essential for anyone studying Computer Science or Computer Engineering. This is the only t
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety cons
Ethan has the perfect plan to impress his dad, a "white hat" hacker who works in IT security. Ethan will hack into the high school's computer system and release a relatively harmless virus he's create
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.The 43 papers included in the book were carefully