Elementary Information Security, 3/e (Paperback)

Smith, Richard E.

  • 出版商: Jones and Bartlett
  • 出版日期: 2019-10-28
  • 售價: $1,460
  • 貴賓價: 9.8$1,431
  • 語言: 英文
  • 頁數: 708
  • 裝訂: Quality Paper - also called trade paper
  • ISBN: 1284153045
  • ISBN-13: 9781284153040
  • 相關分類: 資訊安全
  • 立即出貨 (庫存=1)



If we want a solid understanding of security technology, we must look closely at the underlying strengths a of information technology itself. An ideal text for introductory information security courses, the Third Edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Third Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.

Designed to fulfill curriculum requirement published the U.S. government and the Association for Computing Machinery (ACM), Elementary Information Security, Third Edition also covers the core learning outcomes for information security education published in the ACM's "IT 2008" curricular recommendations. Students who are interested in becoming a Certified Information Systems Security Professional (CISSP) may also use this text as a study aid for the examination.


Dr. Rick Smith, Ph.D., CISSP, is a writer, educator, and consultant who operates the Cryptosmith consulting practice. Dr. Smith has over 30 years of experience with computing systems, half of which has focused on information security. Dr. Smith also teaches at the University of St. Thomas (Minnesota) and has taught at the University of Minnesota and Boston University.


  •  Chapter 1  Security From the Ground Up
  •   Chapter 2  Controlling a Computer
  •   Chapter 3  Controlling Files
  •   Chapter 4  Sharing Files
  •   Chapter 5  Storing Files
  •   Chapter 6  Authenticating People
  •   Chapter 7  Encrypting Files
  •   Chapter 8  Secret and Public Keys
  •   Chapter 9  Encrypting Volumes
  •   Chapter 10  Connecting Computers
  •   Chapter 11  Networks of Networks
  •   Chapter 12  End-to-End Networking
  •   Chapter 13  Network Encryption
  •   Chapter 14  Internet Services and Email
  •   Chapter 15  The World Wide Web
  •   Appendix  Abbreviations