74,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
37 °P sammeln
  • Gebundenes Buch

This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.
In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness-whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that…mehr

Produktbeschreibung
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.

In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness-whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations.

Topics and features:
Explores the range of risks and vulnerabilities in all connected digital systemsPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsDescribes the fundamentals of traditional computer network security, and common threats to securityDiscusses the role and challenges of artificial intelligence in advancing the security of computing systems' algorithms, protocols, and best practicesRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions
This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.

Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.

Autorenporträt
Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.
Rezensionen
"The book offers relevant definitions in the field of security and computer networks ... . The book is definitively addressed to the general nonspecialist public; practitioners may be able to consult it for some definitions. ... It is, in my view, important to emphasize that all of the topics are covered in a merely definitional, descriptive way." (Carla Sánchez Aguilar, Computing Reviews, April, 2016)

"The book contains exercises and advanced exercises, along with relevant references, and comes with support materials for instructors ... making it useful for teaching courses on computer security. ... The exercises and projects are helpful for teaching. ... I believe the third edition will continue to receive praise from students, researchers, and practitioners. I strongly recommend it." (S. V. Nagaraj, Computing Reviews, August, 2015)
"The fourth edition of this outstanding guide is fully revised, keeping in line with the latest technological developments of the computing ecosystem, which resulted from the removal of the logical boundaries between enterprise, mobile, wireless, and home networks, as well as the rapid extension and embedding process of social networks. ... This is an outstanding reference for all computer network security professionals who need to acquire knowledge shared from the great experience of the author." (Computing Reviews, December, 2017)