|
Showing 1 - 15 of
15 matches in All Departments
For courses in Corporate, Computer and Network Security . Network
Securities Essentials: Applications and Standards introduces
students to the critical importance of internet security in our age
of universal electronic connectivity. Amidst viruses, hackers, and
electronic fraud, organisations and individuals are constantly at
risk of having their private information compromised. This creates
a heightened need to protect data and resources from disclosure,
guarantee their authenticity, and safeguard systems from
network-based attacks. The 6th Edition covers the expanding
developments in the cryptography and network security disciplines,
giving students a practical survey of applications and standards.
The text places emphasis on applications widely used for Internet
and corporate networks, as well as extensively deployed internet
standards.
This print textbook is available for students to rent for their
classes. The Pearson print rental program provides students with
affordable access to learning materials, so they come to class
ready to succeed. For graduate and undergraduate courses in
computer science, computer engineering, and electrical engineering.
Comprehensively covers processor and computer design fundamentals
Computer Organization and Architecture, 11th Edition is about the
structure and function of computers. Its purpose is to present, as
clearly and completely as possible, the nature and characteristics
of modern-day computer systems. Written in a clear, concise, and
engaging style, author William Stallings provides a thorough
discussion of the fundamentals of computer organization and
architecture and relates these to contemporary design issues.
Subjects such as I/O functions and structures, RISC, and parallel
processors are thoroughly explored alongside real-world examples
that enhance the text and build student interest. Incorporating
brand-new material and strengthened pedagogy, the 11th Edition
keeps students up to date with recent innovations and improvements
in the field of computer organization and architecture.
For courses in wireless networking, wireless communications,
wireless data communications or wireless technology in departments
of Computer Science, Engineering, IT, and Continuing Education. The
rapid growth of mobile telephone use, satellite services, and the
wireless Internet are generating tremendous changes in
telecommunications and networking. Combining very current technical
depth with a strong pedagogy and advanced Web support, this new
edition provides a comprehensive guide to wireless
technology-exploring key topics such as technology and
architecture, network types, design approaches, and the latest
applications. Visit Stallings Companion Website at http:
//williamstallings.com/CompSec/CompSec1e.html for student and
instructor resources and his Computer Science Student Resource site
http: //williamstallings.com/StudentSupport.html Password protected
instructor resources can be accessed here by clicking on the
Resources Tab to view downloadable files. (Registration required)
They include Power Point Slides, Solutions, tables and figure
For courses in computer/network security Computer Security:
Principles and Practice, 4th Edition, is ideal for courses in
Computer/Network Security. The need for education in computer
security and related topics continues to grow at a dramatic
rate-and is essential for anyone studying Computer Science or
Computer Engineering. Written for both an academic and professional
audience, the 4th Edition continues to set the standard for
computer security with a balanced presentation of principles and
practice. The new edition captures the most up-to-date innovations
and improvements while maintaining broad and comprehensive coverage
of the entire field. The extensive offering of projects provides
students with hands-on experience to reinforce concepts from the
text. The range of supplemental online resources for instructors
provides additional teaching support for this fast-moving subject.
The new edition covers all security topics considered Core in the
ACM/IEEE Computer Science Curricula 2013, as well as subject areas
for CISSP (Certified Information Systems Security Professional)
certification. This textbook can be used to prep for CISSP
Certification and is often referred to as the 'gold standard' when
it comes to information security certification. The text provides
in-depth coverage of Computer Security, Technology and Principles,
Software Security, Management Issues, Cryptographic Algorithms,
Internet Security and more.
For courses in wireless communication networks and systems A
Comprehensive Overview of Wireless Communications Wireless
Communication Networks and Systems covers all types of wireless
communications, from satellite and cellular to local and personal
area networks. Organised into four easily comprehensible,
reader-friendly parts, it presents a clear and comprehensive
overview of the field of wireless communications. For those who are
new to the topic, the book explains basic principles and
fundamental topics concerning the technology and architecture of
the field. Numerous figures and tables help clarify discussions,
and each chapter includes a list of keywords, review questions,
homework problems, and suggestions for further reading. The book
includes an extensive online glossary, a list of frequently used
acronyms, and a reference list. A diverse set of projects and other
student exercises enables instructors to use the book as a
component in a varied learning experience, tailoring courses to
meet their specific needs.
Two-time winner of the best Computer Science and Engineering
textbook of the year award from the Textbook and Academic Authors
Association For a one/two-semester courses in Computer Networks,
Data Communications, and Communications Networks in CS, CIS, and
Electrical Engineering departments. With a focus on the most
current technology and a convenient modular format, this
best-selling text offers a clear and comprehensive survey of the
entire data and computer communications field. Emphasizing both the
fundamental principles as well as the critical role of performance
in driving protocol and network design, it explores in detail all
the critical technical areas in data communications, wide-area
networking, local area networking, and protocol design.
Gain a Deep, Practical Understanding of 5G Technology,
Applications, Architecture, Standards, and Ecosystem The 5G
ultra-high-speed wireless communication standard is a major
technological leap forward--substantially increasing speed and
capacity, enhancing current use cases, and making many new
applications practical. For technical professionals, managers, and
students, 5G requires significant new knowledge and expertise. In
5G Wireless: A Comprehensive Introduction, renowned information
technology author William Stallings presents a comprehensive and
unified explanation of 5G's key applications, technologies, and
standards. Like Stallings' other award-winning texts, this guide
will help you quickly find the information and gain the mastery to
succeed with critical new technology. Stallings first explains how
cellular networks have evolved through 4G and now 5G, and surveys
5G's application areas and use cases. Next, he thoroughly
introduces the 5G core network, covering SDN, NFV, network slicing,
QoS, and edge computing--and provides a detailed coverage of the 5G
air interface and radio access network. Throughout, key concepts
are illuminated through realistic examples, review questions help
you test your understanding, and references support further
exploration. Understand the 5G ecosystem, its building blocks,
standards, and R&D roadmaps Explore the Enhanced Mobile
Broadband (eMBB) use case, where 5G enhances 4G in applications
such as smart offices and dense urban communications Learn how
Massive Machine Type Communications (mMTC) and Ultra-Reliable and
Low-Latency Communications (URLCC) support new applications such as
fog, IoT, and cloud Discover how 5G NextGen core (backbone)
networks serve and interconnect wireless access networks that
connect user devices Master key 5G NR Air Interface and Radio
Access Network (RAN) concepts, including millimeter-wave
transmission, MIMO antennas, and OFDM multiplexing
The Comprehensive Guide to Engineering and Implementing Privacy
Best Practices As systems grow more complex and cybersecurity
attacks more relentless, safeguarding privacy is ever more
challenging. Organizations are increasingly responding in two ways,
and both are mandated by key standards such as GDPR and ISO/IEC
27701:2019. The first approach, privacy by design, aims to embed
privacy throughout the design and architecture of IT systems and
business practices. The second, privacy engineering, encompasses
the technical capabilities and management processes needed to
implement, deploy, and operate privacy features and controls in
working systems. In Information Privacy Engineering and Privacy by
Design, internationally renowned IT consultant and author William
Stallings brings together the comprehensive knowledge privacy
executives and engineers need to apply both approaches. Using the
techniques he presents, IT leaders and technical professionals can
systematically anticipate and respond to a wide spectrum of privacy
requirements, threats, and vulnerabilities-addressing regulations,
contractual commitments, organizational policies, and the
expectations of their key stakeholders. * Review privacy-related
essentials of information security and cryptography * Understand
the concepts of privacy by design and privacy engineering * Use
modern system access controls and security countermeasures to
partially satisfy privacy requirements * Enforce database privacy
via anonymization and de-identification * Prevent data losses and
breaches * Address privacy issues related to cloud computing and
IoT * Establish effective information privacy management, from
governance and culture to audits and impact assessment * Respond to
key privacy rules including GDPR, U.S. federal law, and the
California Consumer Privacy Act This guide will be an indispensable
resource for anyone with privacy responsibilities in any
organization, and for all students studying the privacy aspects of
cybersecurity.
William Stallings' Effective Cybersecurity offers a comprehensive
and unified explanation of the best practices and standards that
represent proven, consensus techniques for implementing
cybersecurity. Stallings draws on the immense work that has been
collected in multiple key security documents, making this knowledge
far more accessible than it has ever been before. Effective
Cybersecurity is organized to align with the comprehensive
Information Security Forum document The Standard of Good Practice
for Information Security, but deepens, extends, and complements
ISF's work with extensive insights from the ISO 27002 Code of
Practice for Information Security Controls, the NIST Framework for
Improving Critical Infrastructure Cybersecurity, COBIT 5 for
Information Security, and a wide spectrum of standards and
guidelines documents from ISO, ITU-T, NIST, Internet RFCs, other
official sources, and the professional, academic, and industry
literature. In a single expert source, current and aspiring
cybersecurity practitioners will find comprehensive and usable
practices for successfully implementing cybersecurity within any
organization. Stallings covers: Security Planning: Developing
approaches for managing and controlling the cybersecurity function;
defining the requirements specific to a given IT environment; and
developing policies and procedures for managing the security
function Security Management: Implementing the controls to satisfy
the defined security requirements Security Evaluation: Assuring
that the security management function enables business continuity;
monitoring, assessing, and improving the suite of cybersecurity
controls. Beyond requiring a basic understanding of cryptographic
terminology and applications, this book is self-contained: all
technology areas are explained without requiring other reference
material. Each chapter contains a clear technical overview, as well
as a detailed discussion of action items and appropriate policies.
Stallings, author of 13 TAA Computer Science Textbooks of the Year,
offers many pedagogical features designed to help readers master
the material. These include: clear learning objectives, keyword
lists, and glossaries to QR codes linking to relevant standards
documents and web resources.
Foundations of Modern Networking is a comprehensive, unified survey
of modern networking technology and applications for today's
professionals, managers, and students. Dr. William Stallings offers
clear and well-organized coverage of five key technologies that are
transforming networks: Software-Defined Networks (SDN), Network
Functions Virtualization (NFV), Quality of Experience (QoE), the
Internet of Things (IoT), and cloudbased services. Dr. Stallings
reviews current network ecosystems and the challenges they
face-from Big Data and mobility to security and complexity. Next,
he offers complete, self-contained coverage of each new set of
technologies: how they work, how they are architected, and how they
can be applied to solve real problems. Dr. Stallings presents a
chapter-length analysis of emerging security issues in modern
networks. He concludes with an up-to date discussion of networking
careers, including important recent changes in roles and skill
requirements. Coverage: Elements of the modern networking
ecosystem: technologies, architecture, services, and applications
Evolving requirements of current network environments SDN:
concepts, rationale, applications, and standards across data,
control, and application planes OpenFlow, OpenDaylight, and other
key SDN technologies Network functions virtualization: concepts,
technology, applications, and software defined infrastructure
Ensuring customer Quality of Experience (QoE) with interactive
video and multimedia network traffic Cloud networking: services,
deployment models, architecture, and linkages to SDN and NFV IoT
and fog computing in depth: key components of IoT-enabled devices,
model architectures, and example implementations Securing SDN, NFV,
cloud, and IoT environments Career preparation and ongoing
education for tomorrow's networking careers Key Features: Strong
coverage of unifying principles and practical techniques More than
a hundred figures that clarify key concepts Web support at
williamstallings.com/Network/ QR codes throughout, linking to the
website and other resources Keyword/acronym lists, recommended
readings, and glossary Margin note definitions of key words
throughout the text
For courses in Cryptography, Computer Security, and Network
Security. Keep pace with the fast-moving field of cryptography and
network security Stallings' Cryptography and Network Security:
Principles and Practice introduces students to the compelling and
evolving field of cryptography and network security. In an age of
viruses and hackers, electronic eavesdropping, and electronic fraud
on a global scale, security is paramount. The purpose of this book
is to provide a practical survey of both the principles and
practice of cryptography and network security. The first part of
the book explores the basic issues to be addressed by a network
security capability and provides a tutorial and survey of
cryptography and network security technology. The latter part of
the book deals with the practice of network security, covering
practical applications that have been implemented and are in use to
provide network security.
The Principles and Practice of Cryptography and Network Security
Stallings' Cryptography and Network Security, Seventh Edition,
introduces the reader to the compelling and evolving field of
cryptography and network security. In an age of viruses and
hackers, electronic eavesdropping, and electronic fraud on a global
scale, security is paramount. The purpose of this book is to
provide a practical survey of both the principles and practice of
cryptography and network security. In the first part of the book,
the basic issues to be addressed by a network security capability
are explored by providing a tutorial and survey of cryptography and
network security technology. The latter part of the book deals with
the practice of network security: practical applications that have
been implemented and are in use to provide network security. The
Seventh Edition streamlines subject matter with new and updated
material - including Sage, one of the most important features of
the book. Sage is an open-source, multiplatform, freeware package
that implements a very powerful, flexible, and easily learned
mathematics and computer algebra system. It provides hands-on
experience with cryptographic algorithms and supporting homework
assignments. With Sage, the reader learns a powerful tool that can
be used for virtually any mathematical application. The book also
provides an unparalleled degree of support for the reader to ensure
a successful learning experience.
For one- or two-semester undergraduate courses in operating systems
for computer science, computer engineering, and electrical
engineering majors An introduction to operating systems with
up-to-date and comprehensive coverage Now in its 9th Edition,
Operating Systems: Internals and Design Principles provides a
comprehensive, unified introduction to operating systems topics for
readers studying computer science, computer engineering, and
electrical engineering. Author William Stallings emphasizes both
design issues and fundamental principles in contemporary systems,
while providing readers with a solid understanding of the key
structures and mechanisms of operating systems. He discusses design
trade-offs and the practical decisions affecting design,
performance and security. The text illustrates and reinforces
design concepts, tying them to real-world design choices with case
studies in Linux, UNIX, Android, and Windows 10. With an
unparalleled degree of support for project integration, plus
comprehensive coverage of the latest trends and developments in
operating systems, including cloud computing and the Internet of
Things (IoT), the text provides everything readers need to keep
pace with a complex and rapidly changing field. The 9th Edition has
been extensively revised and contains new material, new projects,
and updated chapters.
For one- or two-semester undergraduate courses in operating systems
for computer science, computer engineering, and electrical
engineering majors An introduction to operating systems with
up-to-date and comprehensive coverage Now in its 9th Edition,
Operating Systems: Internals and Design Principles provides a
comprehensive, unified introduction to operating systems topics
aimed at computer science, computer engineering, and electrical
engineering majors. Author William Stallings emphasises both design
issues and fundamental principles in contemporary systems, while
providing readers with a solid understanding of the key structures
and mechanisms of operating systems. He discusses design trade-offs
and the practical decisions affecting design, performance and
security. The text illustrates and reinforces design concepts,
tying them to real-world design choices with case studies in Linux,
UNIX, Android, and Windows 10. With an unparalleled degree of
support for integrating projects into the course, plus
comprehensive coverage of the latest trends and developments in
operating systems, including cloud computing and the Internet of
Things (IoT), the text provides everything students and instructors
need to keep pace with a complex and rapidly changing field. The
9th Edition has been extensively revised and contains new material,
new projects, and updated chapters.
For courses in Cryptography, Computer Security, and Network
Security The Principles and Practice of Cryptography and Network
Security Stallings' Cryptography and Network Security introduces
students to the compelling and evolving field of cryptography and
network security. In an age of viruses and hackers, electronic
eavesdropping, and electronic fraud on a global scale, security is
paramount. The purpose of this book is to provide a practical
survey of both the principles and practice of cryptography and
network security. In the first part of the book, the basic issues
to be addressed by a network security capability are explored by
providing a tutorial and survey of cryptography and network
security technology. The latter part of the book deals with the
practice of network security: practical applications that have been
implemented and are in use to provide network security. This
edition streamlines subject matter with new and updated material -
including Sage, one of the most important features of the book.
Sage is an open-source, multiplatform, freeware package that
implements a very powerful, flexible, and easily learned
mathematics and computer algebra system. It provides hands-on
experience with cryptographic algorithms and supporting homework
assignments. With Sage, students learn a powerful tool that can be
used for virtually any mathematical application. The book also
provides an unparalleled degree of support for instructors and
students to ensure a successful teaching and learning experience.
|
You may like...
Bad Luck Penny
Amy Heydenrych
Paperback
(1)
R350
R255
Discovery Miles 2 550
Resurrection
Danielle Steel
Paperback
R365
R260
Discovery Miles 2 600
Still Life
Sarah Winman
Paperback
R358
Discovery Miles 3 580
|