Introduction to Computer Security is a new Computer Security textbook for a new generation of IT professionals. It is ideal for computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with just-enough background in computer science. The result is a presentation of the material that is accessible to students of all levels.
Cited By
- Knorr E, Riva G and Vakarelov O Anatomy of a New Data Science Course in Privacy, Ethics, and Security Proceedings of the 23rd Western Canadian Conference on Computing Education, (1-5)
- Wang Y, Chau P and Chen F (2016). Towards a secured network virtualization, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (55-65), Online publication date: 20-Jul-2016.
- Giboney J, Proudfoot J, Goel S and Valacich J (2016). The Security Expertise Assessment Measure (SEAM), Computers and Security, 60:C, (37-51), Online publication date: 1-Jul-2016.
- Menon V, Fife L and Spears T (2016). The role of the RSA algorithm in awakening the computer science student to the beauty of mathematics, Journal of Computing Sciences in Colleges, 31:4, (70-76), Online publication date: 1-Apr-2016.
- Lan C, Sherry J, Popa R, Ratnasamy S and Liu Z Embark Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, (255-273)
- Schembari N and Jochen M The Assessment of Learning Outcomes in Information Assurance Curriculum Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference, (65-70)
- Menon V and Rivero M (2013). Developing an iPhone app for a more safe and secure encrypted conversation/text/chat, Journal of Computing Sciences in Colleges, 28:4, (75-80), Online publication date: 1-Apr-2013.
- Buchele S Two models of a cryptography and computer security class in a liberal arts context Proceeding of the 44th ACM technical symposium on Computer science education, (543-548)