Language : English
Published : 2015-12-07
Pages : 688
Guide to Networking Essentials 7th Edition
GUIDE TO NETWORKING ESSENTIALS provides students with both the knowledge and hands-on skills necessary to work with network operating systems in a network administration environment. By focusing on troubleshooting and computer networking technologies, this book offers a comprehensive introduction to networking and to advances in software, wireless and network security. Challenge Labs and Hands-On Projects are directly integrated in each chapter to allow for a hands-on experience in the classroom. Updated content reflects the latest networking technologies and operating systems including new Ethernet standards, cloud computing, Windows 10, Windows Server 2016, and recent Linux distributions.
About the Author
Greg Tomsho is director of the Computer Networking Technology Department and Cisco Academy at Yavapai College in Prescott, Ariz. He has earned the CCNA, MCTS, MCSA, A , Security and Linux certifications. A former software engineer, technical support manager and IT director, he has more than 30 years of computer and networking experience. His other books include MCTS GUIDE TO WINDOWS SERVER 2008 ACTIVE DIRECTORY CONFIGURATION, MCTS GUIDE TO MICROSOFT WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE CONFIGURATION, GUIDE TO NETWORKING ESSENTIALS, GUIDE TO NETWORK SUPPORT AND TROUBLESHOOTING and A COURSEPREP EXAMGUIDE.
Pre-Order (3-4 weeks)
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security.
In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective.
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Teaching and Learning Experience To provide a better teaching and learning experience, for both instructors and students, this program will: *Support Instructors and Students: An unparalleled support package for instructors and students ensures a successful teaching and learning experience. *Apply Theory and/or the Most Updated Research: A practical survey of both the principles and practice of cryptography and network security. *Engage Students with Hands-on Projects: Relevant projects demonstrate the importance of the subject, offer a real-world perspective, and keep students interested.
The fourth edition of “Principles of Information Security” explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Students can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field.
Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this design approach through graphical modeling, automated reasoning capabilities to verify the models constructed, and the automatic derivation of security requirements documents. After an introduction to security requirements engineering and an overview of computer and information security, the book presents the STS-ML modeling language, introducing the modeling concepts used, explaining how to use STS-ML within the STS method for security requirements, and providing guidelines for the creation of models. The book then puts the STS approach into practice, introducing the STS-Tool and presenting two case studies from industry: an online collaborative platform and an e-Government system. Finally, the book considers other methods that can be used in conjunction with the STS method or that constitute an alternative to it. The book is suitable for course use or as a reference for practitioners. Exercises, review questions, and problems appear at the end of each chapter.
About the Author
Fabiano Dalpiaz is Assistant Professor in the Department of Information and Computing Sciences at Utrecht University, the Netherlands. Elda Paja is a Postdoctoral Research Fellow in the Department of Engineering and Computer Science at the University of Trento, Italy. Paolo Giorgini is Associate Professor in the Department of Engineering and Computer Science at the University of Trento.