Elementary Information Security, Second Edition

  • 17h 20m
  • Richard E. Smith
  • Jones and Bartlett Learning
  • 2016

An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.

Features & Benefits

  • Access to Navigate 2 online learning materials including a comprehensive and interactive eBook, student practice activities and assessments, learning analytics reporting tools, and more
  • Use of the nationally recognized NIST Risk Management Framework to illustrate the cybersecurity process
  • Comprehensive coverage and full compliance of all topics required for U.S. government courseware certification NSTISSI 4011
  • Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevant
  • Provides tutorial material on the computing technologies that underlie the security problems and solutions
  • Available in our customizable PUBLISH platform

Applicable Courses

Ideal for the second-year undergraduate college or university course in Information Security. This course can be found in various departments including Computer Science, Information Technology, Criminology, and Forensics.

About the Author

Dr. Rick Smith, Ph.D., CISSP, is a writer, educator, and consultant who operates the Cryptosmith consulting practice. Dr. Smith has over 30 years of experience with computing systems, half of which has focused on information security. Dr. Smith also teaches at the University of St. Thomas (Minnesota) and has taught at the University of Minnesota and Boston University.

In this Book

  • Security from the Ground up
  • Controlling a Computer
  • Controlling Files
  • Sharing Files
  • Storing Files
  • Authenticating People
  • Encrypting Files
  • Secret and Public Keys
  • Encrypting Volumes
  • Connecting Computers
  • Networks of Networks
  • End-to-End Networking
  • Enterprise Computing
  • Network Encryption
  • Internet Services and Email
  • The World Wide Web
  • Governments and Secrecy
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.0 of 7 users Rating 4.0 of 7 users (7)