|
Showing 1 - 3 of
3 matches in All Departments
The Art of Computer and Information Security: From Apps and
Networks to Cloud and Crypto Security in Computing, Sixth Edition,
is today's essential text for anyone teaching, learning, and
practicing cybersecurity. It defines core principles underlying
modern security policies, processes, and protection; illustrates
them with up-to-date examples; and shows how to apply them in
practice. Modular and flexibly organized, this book supports a wide
array of courses, strengthens professionals' knowledge of
foundational principles, and imparts a more expansive understanding
of modern security. This extensively updated edition adds or
expands coverage of artificial intelligence and machine learning
tools; app and browser security; security by design; securing
cloud, IoT, and embedded systems; privacy-enhancing technologies;
protecting vulnerable individuals and groups; strengthening
security culture; cryptocurrencies and blockchain; cyberwarfare;
post-quantum computing; and more. It contains many new diagrams,
exercises, sidebars, and examples, and is suitable for use with two
leading frameworks: the US NIST National Initiative for
Cybersecurity Education (NICE) and the UK Cyber Security Body of
Knowledge (CyBOK). Core security concepts: Assets, threats,
vulnerabilities, controls, confidentiality, integrity,
availability, attackers, and attack types The security
practitioner's toolbox: Identification and authentication, access
control, and cryptography Areas of practice: Securing programs,
user–internet interaction, operating systems, networks, data,
databases, and cloud computing Cross-cutting disciplines: Privacy,
management, law, and ethics Using cryptography: Formal and
mathematical underpinnings, and applications of cryptography
Emerging topics and risks: AI and adaptive cybersecurity,
blockchains and cryptocurrencies, cyberwarfare, and quantum
computing Register your book for convenient access to downloads,
updates, and/or corrections as they become available. See inside
book for details.
|
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings (Paperback, 2013 ed.)
Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp
|
R1,429
Discovery Miles 14 290
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 6th
International Conference on Trust and Trustworthy Computing, TRUST
2013, held in London, UK, in June 2013. There is a technical and a
socio-economic track. The full papers presented, 14 and 5
respectively, were carefully reviewed from 39 in the technical
track and 14 in the socio-economic track. Also included are 5
abstracts describing ongoing research. On the technical track the
papers deal with issues such as key management, hypervisor usage,
information flow analysis, trust in network measurement, random
number generators, case studies that evaluate trust-based methods
in practice, simulation environments for trusted platform modules,
trust in applications running on mobile devices, trust across
platform. Papers on the socio-economic track investigated, how
trust is managed and perceived in online environments, and how the
disclosure of personal data is perceived; and some papers probed
trust issues across generations of users and for groups with
special needs.
As we become increasingly dependent on digital products in all
aspects of our lives, the reliability of that technology increases
in importance. Technological security can be thought of as the
control of access to technical systems and the control of the use
of those systems. However, the way that digital technologies are
woven across the fabric of our everyday lives, and are embedded in
all our institutions, means that we need a paradigm for
understanding technological security as being part of other forms
of security. This monograph introduces the paradigm of digital
security that not only encompasses the protection of digital
technologies and the data it produces but also the practices and
processes that link those technologies. It encompasses the
political and social processes and practices that shape the
meanings and experiences of the digital protection mechanisms. In a
digitally mediated society, security of the state, of society, of
individuals, and of technologies are bound together through these
processes and practices, giving new security meanings to security
technologies and policies. Grounded in the interdisciplinary
endeavours that characterise Web Science, this monograph presents
the case for this more inclusive form of technological security.
Such a security places the security of technology in the context of
the security of people operating in a web-enabled and
digitally-connected society and results in a digital security that
responds to the enmeshed nature of technology and society. This
monograph situates digital security within the broader landscape of
social and political theories of security, and uses a critical
security lens to encourage the reader to explore how digitally
networked technologies are both included in and influenced by the
co-creation of artefacts and practices in open environments.
|
|