You must be logged in to post a review.
Academic book request
Inspection copies are available to lecturers and course leaders considering books for courses. If you teach a relevant course of 12 or more students, please complete the form below with your details. We also kindly request that you provide feedback on any textbook you receive within 60 days of receipt.
In-line with our Environmental Policy and to avoid unnecessary wastage, we provide digital access for inspection copy purposes. Print copies can be provided if books are adopted as course reading.
Please note that all requests are subject to our approval. Further details regarding our inspection copy service may be found HERE.
Elementary Information Security
Author: Richard E. SmithOVERVIEW
If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analysing security problems and practicing simulated security activities. Emphasising learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.
Designed to fulfil curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination.
Features and Benefits
- Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevant
- Increased focus on the security of mobile devices and technology
- NEW coverage on the internet of things (IOT)
- Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher modes
- Updated Attack terminology describes attack vectors and attack spaces.
Related Products
Our Reviews
Blog
Last Month's Bestseller
Clinical ECGs in Paramedic Practice
‘This excellent book will be of interest and indeed of much value to anyone wanting to understand ECG interpretation. It is one that I can definitely recommend.’ Douglas Chamberlain, CBE...
ViewBecome a Class VIP!
Sign up to hear about new products, promotions and more! Plus, enjoy a 25% discount and free P&P each month!
Reviews
There are no reviews yet.