Pearson eText for Corporate Computer Security

by ;
Edition: 5th
Format: eBook
Pub. Date: 2020-02-21
Publisher(s): Pearson
  • This product is included in:
    This product is included in Pearson+
List Price: $67.90

Rent Textbook

Select for Price
There was a problem. Please try again later.

Buy Courseware

Rent Digital Options
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$50.94*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

Summary

For introductory courses in information security.

A technical and managerial guide to corporate computer security.
Corporate Computer Security provides a strong managerial focus along with a solid technical understanding of security tools. The text focuses on how to proactively defend corporate systems from attacks and the technical aspects of countermeasures, while also informing students about what they need to know to manage these technologies. The 5th Edition keeps up to date with rapid changes in the IT industry with a new opening case, more content about data breaches, updated news articles, new business-focused articles, new in-depth technical articles, new ethics articles, new hands-on projects, and updated statistics, standards and laws.

Pearson eText is a simple-to-use, mobile-optimized, personalized reading experience. It lets students highlight, take notes, and review key vocabulary all in one place, even when offline. Seamlessly integrated videos and other rich media engage students and give them access to the help they need, when they need it. Educators can easily customize the table of contents, schedule readings, and share their own notes with students so they see the connection between their eText and what they learn in class — motivating them to keep reading, and keep learning. And, reading analytics offer insight into how students use the eText, helping educators tailor their instruction.

NOTE: This ISBN is for the Pearson eText access card. For students purchasing this product from an online retailer, Pearson eText is a fully digital delivery of Pearson content and should only be purchased when required by your instructor. In addition to your purchase, you will need a course invite link, provided by your instructor, to register for and use Pearson eText.

Author Biography

Randall Boyle is an associate professor of management information systems, and Willard Eccles Fellow, at Weber State University in the Goddard School of Business and Economics. He received his Ph.D. in Management Information Systems from Florida State University in 2003. He also has a master’s degree in Public Administration and a B.S. in Finance. His research areas include deception detection in computer-mediated environments, data breaches, secure information systems, the effects of IT on cognitive biases, and the effects of IT on knowledge workers. He has received college teaching awards at Weber State University, Longwood University, the University of Utah, and the University of Alabama in Huntsville. His teaching is primarily focused on management information systems, information security, and networking. He has authored several books including Using MIS 11e, Experiencing MIS 9e, Corporate Computer and Network Security 5e, Applied Information Security, and Applied Networking Labs.

Ray Panko is Professor Emeritus of Information Technology Management at the University of Hawai`i’s Shidler College of Business. His main courses are networking and security. Before coming to the university, he was a project manager at Stanford Research Institute (now SRI International), where he worked for Doug Englebart (the inventor of the mouse). He received his BS in Physics and his MBA from Seattle University. He received his doctorate from Stanford University, where his dissertation was conducted under contract to the Office of the President of the United States. He has been awarded the Shidler College of Business’s Dennis Ching award as the outstanding teacher among senior faculty. He is also a Shidler Fellow.

Table of Contents

  1. The Threat Environment
  2. Planning and Policy
  3. Cryptography
  4. Secure Networks
  5. Access Control
  6. Firewalls
  7. Host Hardening
  8. Application Security
  9. Data Protection
  10. Incident and Disaster Response


Module A. Networking Concepts

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.