For introductory courses in IT Security. Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace. …
Cloud Computing
Biomedical Informatics: Computer Applications in Health Care and Biomedicine (Health Informatics)
The practice of modern medicine and biomedical research requires sophisticated information technologies with which to manage patient information, plan diagnostic procedures, interpret laboratory results, and carry out investigations. Biomedical Informatics provides both a conceptual framework and a practical inspiration for this swiftly emerging scientific discipline at the intersection of computer science, decision science, information science, cognitive science, and …
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With …
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs …
With thoroughly revised advice for finding, evaluating, and documenting sources, this handy spiral-bound booklet covers the essential information college students need for research assignments in more than 30 disciplines. New, up-to-date documentation models guide students as they cite common sources and newer sources — such as blogs, podcasts, online videos, and reposted Web content — in one of …
Business Data Communications- Infrastructure, Networking and Security (7th Edition)
For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program. Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are …
The bestselling guide for network administrators, fully updated for Windows 8 If you’re responsible for a network, large or small, this book is your one-stop resource for all the essential details you need to know. Fully updated to cover Windows 8 and Windows Server 2012, it features the latest on broadband technologies, storage, backup procedures, and all …
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, …
Appropriate for all introductory-to-intermediate courses in computer networking, the Internet, or Internet applications; readers need no background in networking, operating systems, or advanced mathematics. Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today’s Internet to support applications ranging from web browsing to …
Introduction to Programming with Java: A Problem Solving Approach
Introduction to Programming with Java: A Problem Solving Approach teaches the reader how to write programs using Java. It does so with a unique approach that combines fundamentals first with objects early. The book transitions smoothly through a carefully selected set of procedural programming fundamentals to object-oriented fundamentals. During this early transition and beyond, the book emphasizes problem …