Academic book request
Inspection copies are available to lecturers considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with the details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
Please note that outside of the UK, we can only provide eBooks. All requests are subject to our approval, further details regarding T&Cs may be found on our website.
Elementary Information SecurityAuthor: Richard E. Smith
If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analysing security problems and practicing simulated security activities. Emphasising learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.
Designed to fulfil curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination.
Features and Benefits
Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevant
Increased focus on the security of mobile devices and technology
NEW coverage on the internet of things (IOT)
Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher modes
Updated Attack terminology describes attack vectors and attack spaces.