Lizzie Coles-Kemp - Security in Computing - Paperback
Lizzie Coles-Kemp - Security in Computing - Paperback
Low stock: 8 left
Free Shipping
Couldn't load pickup availability
About this Item
The item is a book Paperback
The Author Name is Lizzie Coles-Kemp
The Title is Security in Computing
Condition New
Other Comments
New Store Stock
Product Description -
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection illustrates them with up-to-date examples and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools app and browser security security by design securing cloud, IoT, and embedded systems privacy-enhancing technologies protecting vulnerable individuals and groups strengthening security culture cryptocurrencies and blockchain cyberwarfare post-quantum computing and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack typesThe security practitioner's toolbox: Identification and authentication, access control, and cryptographyAreas of practice: Securing programs, user-internet interaction, operating systems, networks, data, databases, and cloud computingCross-cutting disciplines: Privacy, management, law, and ethicsUsing cryptography: Formal and mathematical underpinnings, and applications of cryptographyEmerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
When possible we will add details of the items we are selling to help buyers know what is included in the item for sale. The details are provided automatically from our central master database and can sometimes be wrong.
Books are released in many editions and variations, such as standard edition, re-issue, not for sale, promotional, special edition, limited edition, and many other editions and versions. The Book you receive could be any of these editions or variations. If you are looking for a specific edition or version please contact us to verify what we are selling.
Gift Ideas
This is a great gift idea.
Hours of Service
We have many warehouses, some of the warehouses process orders seven days a week, but the Administration Support Staff are located at a head office location, outside of the warehouses, and typically work only Monday to Friday.
Location ID 245z
iHaveit SKU ID 174141422
SKU: SKU:174141422
Materials
Materials
Dimensions
Dimensions
Care Instructions
Care Instructions
Shipping & Returns
Shipping & Returns

Free Shipping
We provide free shipping for all products within the UK