skip to main content
Skip header Section
Introduction to Computer SecurityOctober 2010
Publisher:
  • Addison-Wesley Publishing Company
  • United States
ISBN:978-0-321-51294-9
Published:25 October 2010
Pages:
576
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with just-enough background in computer science. The result is a presentation of the material that is accessible to students of all levels.

Cited By

  1. ACM
    Knorr E, Riva G and Vakarelov O Anatomy of a New Data Science Course in Privacy, Ethics, and Security Proceedings of the 23rd Western Canadian Conference on Computing Education, (1-5)
  2. Wang Y, Chau P and Chen F (2016). Towards a secured network virtualization, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (55-65), Online publication date: 20-Jul-2016.
  3. Giboney J, Proudfoot J, Goel S and Valacich J (2016). The Security Expertise Assessment Measure (SEAM), Computers and Security, 60:C, (37-51), Online publication date: 1-Jul-2016.
  4. Menon V, Fife L and Spears T (2016). The role of the RSA algorithm in awakening the computer science student to the beauty of mathematics, Journal of Computing Sciences in Colleges, 31:4, (70-76), Online publication date: 1-Apr-2016.
  5. Lan C, Sherry J, Popa R, Ratnasamy S and Liu Z Embark Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (255-273)
  6. ACM
    Schembari N and Jochen M The Assessment of Learning Outcomes in Information Assurance Curriculum Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference, (65-70)
  7. Menon V and Rivero M (2013). Developing an iPhone app for a more safe and secure encrypted conversation/text/chat, Journal of Computing Sciences in Colleges, 28:4, (75-80), Online publication date: 1-Apr-2013.
  8. ACM
    Buchele S Two models of a cryptography and computer security class in a liberal arts context Proceeding of the 44th ACM technical symposium on Computer science education, (543-548)
Contributors
  • Johns Hopkins University
  • Brown University

Recommendations