Academic book request
In order to decide if a book might be suitable for your course we know that you need to look at it in detail.
If you are an academic teaching a course of 12 or more students you can choose up to three complimentary inspection copies of textbooks that are applicable to the courses that you teach.
To request your inspection copies, please complete the form below.
Elementary Information SecurityAuthor: Richard E. Smith
If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal text for introductory information security courses, the third edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analysing security problems and practicing simulated security activities. Emphasising learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.
Designed to fulfil curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM’s “IT 2008” curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination.
Features and Benefits
Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevant
Increased focus on the security of mobile devices and technology
NEW coverage on the internet of things (IOT)
Updated cryptographic discussions to help further distinguish the roles of elliptic curve cryptography, TLS vs. SSL, quantum concepts, and modern cipher modes
Updated Attack terminology describes attack vectors and attack spaces.