For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with ?just-enough? background in computer science. The result is a presentation of the material that is accessible to students of all levels. Features + Benefits Accessible to the general-knowledge reader. Authors Goodrich and Tamassia recognize that prerequisites for an extensive background in CS and mathematics are not only unnecessary for learning but also arguably contribute to a reduction in enrollments and a shortage of computer-security experts. Therefore, the authors assume only the most basic of prerequisite knowledge in computing, making this text suitable for beginning computer science majors, as well as computer science minors and non-majors. Teaches general principles of computer security from an applied viewpoint. In this new text, the authors cover specific computer security topics while providing necessary material on the foundations of computing needed to understand these topics. As a result, students learn about vital computer security topics such as access control, firewalls, and viruses as well as a variety of fundamental computer-science concepts like algorithms, operating systems, networking, and programming languages. Topics covered include: o Common cyberattacks including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. o Techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. o Fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols. o Human and social aspects of computer security, including usability, interfaces, copyright, digital rights management, social engineering, and ethical issues. A practical introduction that will prepare students for careers in a variety of fields. This text encourages students to think about security issues and to deploy security mechanisms early in designing software applications or in making software purchase/ deployment decisions. This skill will be appreciated by future employers--who may include corporations in the financial, healthcare and technology sectors--for whom the security of software applications is a critical requirement. The material in the text will also provide readers with a clear understanding of the security ramifications of using computers and the Internet in their daily lives (e.g., for online banking and shopping), as well as the potential threats to individual privacy (as seen in recent debates on electronic voting, for example), and possibly to democracy itself, that may arise from inappropriate use of computer security technology. Projects The authors provide a collection of creative, hands-on projects at three levels of difficulty that can be used both in computer security and computer security-related courses. A wide set of options will allow instructors to customize the projects to suit a variety of learning modes and lab resources. In each project, students are given a realistic, though simplified, version of a working system with multiple vulnerabilities and a list of allowed attack vectors. They may be asked to work in ?break-it? mode, which will require students to attack a system by developing exploits that take advantage of the discovered vulnerabilities, or they may be asked to work in ?fix-it? mode in which the student hardens the system by developing mechanisms for removing or mitigating the vulnerabilities. SUPPLEMENTS A collection of slide presentations created by the authors each suitable for a one-hour lecture, covering all the course topics. The presentations will include links to relevant resources on the web and will have extensive notes. The slide presentations have been created in a standard file format compatible
Wiso Mein Büro 365 PlusAngebote & Rechnungen, Einnahmen & Ausgaben, Online Banking & SteuerCD-ROMEAN: 4011282001490Auflage: NeuauflageErscheinungsjahr: 2018Sprache: DeutschMaße: 198 x 141 x 32 mmEDV, Informatik, Wirtschaft, Office-Pa
Wiso Mein Büro 365 StandardAngebote & Rechnungen, Einnahmen & Ausgaben, Online BankingCD-ROMEAN: 4011282001476Auflage: NeuauflageErscheinungsjahr: 2018Sprache: DeutschMaße: 195 x 141 x 35 mmEDV, Informatik, Wirtschaft, Office-Pakete, Anw
Verschlüsselung ist ein fester Bestandteil unseres Alltags - ob beim E-Mail-Versand, Online-Banking oder Einkauf im Internet. Dieses Heft bietet eine komplette Unterrichtseinheit zur Kryptografie, in der die Schüler die wichtigsten Verschlüsselungsverfahren von der Antike bis zum heutigen Tag kennen und selbst anwenden lernen: mit leicht verständlichen Erläuterungstexten sowie ausführlichen, kommentierten Beispielen und zahlreichen Übungsaufgaben, anhand derer die verschiedenen Verfahren trainiert werden. Die Lösungen zu allen Aufgaben sorgen für eine rasche Kontrolle. Mit der beiliegenden CD erhalten Sie 8 kleine Programme plus Programmieraufgaben. Damit können die Schüler zum einen die verschiedenen Verfahren leicht selbst nachvollziehen und zum anderen eigene Programme am Computer schreiben, die das Ver- und Entschlüsseln übernehmen. Als Entwicklungsumgebung dient Lazarus, eine Delphi ähnliche freie Umgebung. Grundlegende Programmierkenntnisse werden für das Bearbeiten der Aufgaben vorausgesetzt.