Skip to product information
1 of 1

Lizzie Coles-Kemp - Security in Computing - Paperback

Lizzie Coles-Kemp - Security in Computing - Paperback

Regular price £79.24 GBP
Regular price Sale price £79.24 GBP
Sale Sold out
Tax included.

Low stock: 8 left

Free Shipping

Title
Gender
New Store Stock
About this Item

The item is a book Paperback
The Author Name is Lizzie Coles-Kemp
The Title is Security in Computing

Condition New

Other Comments
New Store Stock


Product Description -
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection illustrates them with up-to-date examples and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools app and browser security security by design securing cloud, IoT, and embedded systems privacy-enhancing technologies protecting vulnerable individuals and groups strengthening security culture cryptocurrencies and blockchain cyberwarfare post-quantum computing and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack typesThe security practitioner's toolbox: Identification and authentication, access control, and cryptographyAreas of practice: Securing programs, user-internet interaction, operating systems, networks, data, databases, and cloud computingCross-cutting disciplines: Privacy, management, law, and ethicsUsing cryptography: Formal and mathematical underpinnings, and applications of cryptographyEmerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

When possible we will add details of the items we are selling to help buyers know what is included in the item for sale. The details are provided automatically from our central master database and can sometimes be wrong.

Books are released in many editions and variations, such as standard edition, re-issue, not for sale, promotional, special edition, limited edition, and many other editions and versions.  The Book you receive could be any of these editions or variations. If you are looking for a specific edition or version please contact us to verify what we are selling.

 

Gift Ideas
This is a great gift idea.

 

Hours of Service
We have many warehouses, some of the warehouses process orders seven days a week, but the Administration Support Staff are located at a head office location, outside of the warehouses, and typically work only Monday to Friday.


Location ID 245z

iHaveit SKU ID 174141422

SKU: SKU:174141422

Materials

Dimensions

Care Instructions

Shipping & Returns

View full details

Free Shipping

We provide free shipping for all products within the UK