Introduction to Computer Security

 
9780133575477: Introduction to Computer Security

Introduction to Computer Security is appropriateforuse in computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence. It is also suitable for anyone interested in a very accessible introduction to computer security.

 

A Computer Security textbook for a new generation of IT professionals

 

Unlike most other computer security textbooks available today, Introduction to Computer Security, does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with “just-enough” background in computer science. The result is a presentation of the material that is accessible to students of all levels.

 

Teaching and Learning Experience

This program will provide a better teaching and learning experience–for you and your students. It will help:

 

  • Provide an Accessible Introduction to the General-knowledge Reader: Only basic prerequisite knowledge in computing is required to use this book.
  • Teach General Principles of Computer Security from an Applied Viewpoint: As specific computer security topics are covered, the material on computing fundamentals needed to understand these topics is supplied.
  • Prepare Students for Careers in a Variety of Fields: A practical introduction encourages students to think about security of software applications early.
  • Engage Students with Creative, Hands-on Projects: An excellent collection of programming projects stimulate the student’s creativity by challenging them to either break security or protect a system against attacks.
  • Enhance Learning with Instructor and Student Supplements: Resources are available to expand on the topics presented in the text.

"synopsis" may belong to another edition of this title.

About the Author:

Professors Goodrich and Tamassia are well-recognized researchers in computer security, algorithms and data structures, having published many papers on these subjects, with applications to computer security, cryptography, cloud computing, information visualization, and geometric computing. They have served as principal investigators in several joint projects sponsored by the National Science Foundation, the Army Research Office, and the Defense Advanced Research Projects Agency. They are also active in educational technology research, and they have published several books, including a widely adopted textbook on data structures and algorithms.

 

Michael Goodrich received his Ph.D. in computer science from Purdue University. He is currently a Chancellor’s Professor in the Department of Computer Science at University of California, Irvine. Previously, he was a professor at Johns Hopkins University. He is an editor for the Journal of Computer and Systems Sciences and the Journal of Graph Algorithms and Applications. He is a Fulbright Scholar, a Distinguished Scientist of the Association for Computing Machinery (ACM), and a Fellow of the American Association for the Advancement of Science (AAAS), the ACM, and the Institute of Electrical and Electronics Engineers (IEEE).

 

Roberto Tamassia received his Ph.D. in electrical and computer engineering from the University of Illinois at Urbana-Champaign. He is currently the Plastech Professor of Computer Science and the chair of the Department of Computer Science at Brown University. He is a founder and editor-in-chief for the Journal of Graph Algorithms and Applications. He previously served on the editorial board of Computational Geometry: Theory and Applications and IEEE Transactions on Computers. He is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE).

 

In addition to their research accomplishments, the authors also have extensive experience in the classroom. For example, Goodrich has taught data structures and algorithms courses, including Data Structures as a freshman-sophomore level course, Applied Cryptography as a sophomore- junior level course, and Internet Algorithmics as an upper level course. He has earned several teaching awards in this capacity. Tamassia has taught Data Structures and Algorithms as an introductory freshman-level course and Computational Geometry as an advanced graduate course.  Over the last several years he has developed "Introduction to Computer Systems Security," a new computer security course aimed at sophomores.  His teaching of this course since 2006 has helped to shape the vision and topics of this book.  One thing that has set his teaching style apart is his effective use of interactive hypermedia presentations integrated with the web.

"About this title" may belong to another edition of this title.

(No Available Copies)

Search Books:



Create a Want

If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!

Create a Want