40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
20 °P sammeln
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
20 °P sammeln
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
20 °P sammeln
Jetzt verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
20 °P sammeln
  • Format: PDF

All aspects of computer security-from the firewall for a home PC to the most daunting designs for large distributed systems-are becoming increasingly important worldwide. However, the complexities of securing computing systems can often make the topic too intimidating or onerous for people who are relative novices.
Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, and concepts that drive this pivotal area of computer science. With its user-friendly approach and clarity of style, the text conveys-in simple
…mehr

Produktbeschreibung
All aspects of computer security-from the firewall for a home PC to the most daunting designs for large distributed systems-are becoming increasingly important worldwide. However, the complexities of securing computing systems can often make the topic too intimidating or onerous for people who are relative novices.

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, and concepts that drive this pivotal area of computer science. With its user-friendly approach and clarity of style, the text conveys-in simple terms-the core principles and developments underlying computer security in its many ramifications in the rapidly evolving computing arena. Following its opening framework laid out in a broad preface and introductory chapter, the book features chapters dedicated to a wide array of security-related subtopics: physical security, viruses and worms, malware and spyware, privacy and trust, and cryptography, to name several. The work is a sort of guidebook for newcomers: It assumes only basic knowledge of computers and refrains from heavy mathematical elements.

Topics and Features:

. Provides a comprehensive, accessible overview of the elements of computer security, conveyed in an easy-to-understand style

. Covers the main security challenges, and introduces cryptography

. Reinforces its themes with thorough use of examples, exercises (with answers), historical anecdotes, and case studies

. Features a supplemental website for auxiliary instructional material

. Supplies numerous resources, including a helpful glossary, a virus timeline, and an extensive bibliography

. Instructs readers through a logical andprogressive method, yet flavors treatment of the topic with enjoyable quotes, provocative questions, and other educational tools

. Presents the "essentials," but offers additional useful background information

This broad, yet practical textbook/reference is an invaluable instructional tool for undergraduates, graduates, or professionals who know at least the basics about computers but need some exposure to the key elements pertaining to computer security. Its concise approach, complemented by its breadth of security issues covered, will make it an ideal resource for those hoping to learn the foundation topics of this critical subject.

David Salomon is a professor emeritus of computer science at California State University, Northridge. He has authored numerous articles, as well as the popular books, Data Compression: The Complete Reference (now in its third edition) and Data Privacy and Security.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
David Salomon, California State University, Northridge, CA, USA
Rezensionen
From the reviews:

"...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend." (Richard Jankowski, The Book Review Column by William Gasarch, 2008)

"the book is an easy-to-read collection of practical knowledge. ...a useful collection of in-depth knowledge... Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. ...worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations." (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007)

"The intended audience of this book is newcomers ... . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. ... much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material." (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008)
…mehr
Aus den Rezensionen: "... Der chronologische Abriss über die Entwicklung der Computer-Viren ist sehr interessant und verdeutlicht ... einmal mehr, wo der eigentliche Schwerpunkt des ... Buches liegt. Richtig nützlich sind ... die Schlussbemerkungen. ... Zahlreich Hinweise auf Literatur und Internet-Seiten garnieren den Text. ... David Salomon schmückt zur Auflockerung den Text mit vielen Zitaten und kurzen Hintergrundgeschichten. ... Ebenfalls auflockernd sind die vielen Übungsaufgaben, deren Lösungen am Buchende nachgeschlagen werden können. Das Register ist sehr umfassend, man merkt, dass der Autor sehr großen Wert auf einen detaillierten Index legt ..."(Dr. Udo Seidel, in: www.wissenschaft-online.de, 28. Dez. 2008)