Senin, 06 Oktober 2014

* PDF Ebook Elementary Information Security, by Richard E. Smith

PDF Ebook Elementary Information Security, by Richard E. Smith

So, when you require fast that book Elementary Information Security, By Richard E. Smith, it doesn't need to wait for some days to get the book Elementary Information Security, By Richard E. Smith You can directly get guide to save in your device. Even you enjoy reading this Elementary Information Security, By Richard E. Smith all over you have time, you could enjoy it to read Elementary Information Security, By Richard E. Smith It is surely handy for you that wish to get the a lot more priceless time for reading. Why do not you invest five minutes as well as spend little cash to obtain guide Elementary Information Security, By Richard E. Smith here? Never ever let the extra thing quits you.

Elementary Information Security, by Richard E. Smith

Elementary Information Security, by Richard E. Smith



Elementary Information Security, by Richard E. Smith

PDF Ebook Elementary Information Security, by Richard E. Smith

Tips in deciding on the most effective book Elementary Information Security, By Richard E. Smith to read this day can be gained by reading this resource. You could find the very best book Elementary Information Security, By Richard E. Smith that is sold in this world. Not just had guides published from this country, but additionally the various other countries. And also now, we suppose you to check out Elementary Information Security, By Richard E. Smith as one of the reading products. This is only one of the very best books to collect in this website. Consider the web page and search the books Elementary Information Security, By Richard E. Smith You could discover bunches of titles of the books given.

As understood, experience as well as experience concerning driving lesson, home entertainment, and understanding can be acquired by only reviewing a book Elementary Information Security, By Richard E. Smith Also it is not straight done, you could know even more concerning this life, about the world. We offer you this appropriate and also simple method to get those all. We provide Elementary Information Security, By Richard E. Smith as well as many book collections from fictions to science in any way. One of them is this Elementary Information Security, By Richard E. Smith that can be your companion.

Just what should you think a lot more? Time to get this Elementary Information Security, By Richard E. Smith It is very easy then. You could just rest and remain in your area to get this publication Elementary Information Security, By Richard E. Smith Why? It is on-line publication store that give a lot of compilations of the referred publications. So, simply with internet link, you can delight in downloading this book Elementary Information Security, By Richard E. Smith and also numbers of publications that are looked for now. By checking out the web link web page download that we have provided, the book Elementary Information Security, By Richard E. Smith that you refer a lot can be discovered. Simply save the asked for publication downloaded and install and then you can take pleasure in the book to read every single time and also place you want.

It is quite easy to check out guide Elementary Information Security, By Richard E. Smith in soft file in your gizmo or computer. Again, why must be so difficult to obtain guide Elementary Information Security, By Richard E. Smith if you can pick the easier one? This web site will certainly ease you to select and also choose the most effective collective books from one of the most ideal vendor to the launched publication lately. It will consistently upgrade the collections time to time. So, connect to internet and also visit this site constantly to get the new book everyday. Now, this Elementary Information Security, By Richard E. Smith is yours.

Elementary Information Security, by Richard E. Smith

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools. Elementary Information Security is certified to comply fully with the NSTISSI 4011: the federal training standard for information security professionals. See a detailed topic matching spreadsheet under the Additional Resources tab below. An ideal text for introductory information security courses, the second edition of Elementary Information Security provides a comprehensive yet easy-to-understand introduction to the complex world of cybersecurity and technology. Thoroughly updated with recently reported cybersecurity incidents, this essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems. Key Features of the Updated Second Edition Include: • Access to Navigate 2 online learning materials including a comprehensive and interactive eBook, student practice activities and assessments, learning analytics reporting tools, and more • Use of the nationally recognized NIST Risk Management Framework to illustrate the cybersecurity process • Comprehensive coverage and full compliance of all topics required for U.S. government courseware certification NSTISSI 4011 • Presents security issues through simple business-oriented case studies to make cybersecurity technology and problem-solving interesting and relevant • Provides tutorial material on the computing technologies that underlie the security problems and solutions • Available in our customizable PUBLISH platform

  • Sales Rank: #40902 in Books
  • Published on: 2015-03-08
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.00" h x 2.00" w x 7.30" l, .0 pounds
  • Binding: Paperback
  • 866 pages

About the Author
Smith is an Air Traffic Controller, Private Pilot, freelance writer and web page designer.

Most helpful customer reviews

21 of 22 people found the following review helpful.
Magnum opus on the topic
By Ben Rothke
When I first got a copy of Elementary Information Security, based on its title, weight and page length, I assumed it was filled with mindless screen shots of elementary information security topics, written with a large font, in order to jack up the page count. Such an approach is typical of far too many security books. With that, if there ever was a misnomer of title, Elementary Information Security is it.

For anyone looking for a comprehensive information security reference guide - Elementary Information Security is it. While the title may say elementary, for the reader who spends the time and effort to complete the book, they will come out with a complete overview of every significant information security topic.

The book is in fact a textbook meant to introduce the reader to the topic of information security. But it has enough content to be of value to everyone; security notices or experienced professional.

Author Richard Smith notes that if you want to get a solid understanding of information security technology, you have to look closely at the underlying strengths and weakness of information technology itself, which requires a background in computer architecture, operating systems and computing networking.

With that, Elementary Information Security is a tour de force that covers every information security topic, large and small. The book also provides a relevant overview of the peripheral topics that are embedded into information security.

In 17 chapters covering over 800 pages, the book is well organized and progressively gets more complex. Two large chapters of the book are freely available online, with chapter 3 here and chapter 9 here.

The following are the chapters in the book, which shows a comprehensive overview of all of the core areas around information security:

Security From the Ground Up
Controlling a Computer
Controlling Files
Sharing Files
Storing Files
Authenticating People
Encrypting Files
Secret and Public Keys
Encrypting Volumes
Connecting Computers
Networks of Networks
End-to-End Networking
Enterprise Computing
Network Encryption
Internet Services and Email
The World Wide Web
Governments and Secrecy

The early chapters focus on the fundamentals of computers and networking, and the core aspects of information security. The chapters progress in complexity and deal with distributed systems and more complex security topics. The mid-chapters deal with cryptography, starting with an introduction to the topic, into more complex topics and scenarios. One is hard-pressed to find an information security topic not covered in the book.

Chapter 1 is on Security from the Ground Up and lays the groundwork for what security is. Various topics around risk are detailed; such as identifying, prioritizing and assessing risks.

Chapter 2 is on Controlling a Computer and reviews the underlying architecture around computers.

For some people, much of their learning about information security is based on rote memorization. In the book, Smith eschews this and each chapter closes with a glossary of topics, and penetrating questions. There are also problem definitions which detail practical situations with the hope that the reader can create and adequate security solution. The reader who spends extra time reviewing the questions will find that it will significantly help in their mastering the myriad topics.

The goal of the questions and exercises is to make the knowledge real. Some of the exercises include watching movies with computer security related topics such as The Falcon and the Snowman, Crimson Tide, and others. For example, in The Falcon and the Snowman, the author asks the reader to identify two types of security measure that would have helped prevent theft of the crypto keys. In Crimson Tide, it asks the reader to consider the missile launch procedures portrayed in the film and asks if it is possible for a single person to launch a nuclear missile. Another scenario is that under what circumstances a recipient should accept an unauthenticated message. It also asks the reader to give an example of a circumstance in which accepting an unauthenticated message would yield the wrong result.

The book is not meant as a For Dummies guide to the topic, and it assumes a college-level comprehension of relevant mathematical concepts. Note though that the requisite math is detailed in the sections on encryption and cryptography.

The book is also the first textbook certified by the NSA to comply with the NSTISSI 4011 standard, which is the federal training standard for information security professionals. The author notes on his blog that in order to gain that certification, he had to map each topic required by the standard to the information as it appears in the textbook.

Given the value of the book, (ISC)² should consider using this title as a reference for their CISSP certification. With all of the CISSP preparation guides available, even the Official (ISC)2 Guide to the CISSP CBK, one is hard pressed to find a comprehensive all-embracing security reference such as this. Some may even want to simply use this book as their definitive CISSP study guide.

For those looking for a single encyclopedic reference on information security, they should look no further than Elementary Information Security. Richard Smith has written a magnum opus on the topic, which will be of value for years to come.

7 of 7 people found the following review helpful.
Excellent comprehensive textbook, and perfect for self study
By Tim Leonard
Purpose:
If you want to become an information security professional, this is the book you need. It is nearly 900 solid pages of useful information, carefully written. It includes very little material that you won't need, and provides a complete base for on-the-job experience. It covers the security topics required by the ACM's IT curriculum, and the US government's Information Assurance training standards for administrators of national security systems.

Audience:
Though it was created as a textbook for an undergraduate course, it makes an *excellent* text for self study: it comprehensively covers the entire subject area, and it includes all background material that the intended reader may need in order to understand the primary subject matter. The book's organization shows the author's experience with teaching this material in class. The reader must be familiar with files, applications, email, and the web, but needs little more than that--not even programming. Yet because the sections introducing background material are short, appear just before they're needed, and clearly bring to the fore the ideas that are about to be used, they are useful even to a reader with a much deeper background. The discussion covers Linux, Windows, and OS X without assuming that the reader is familiar with any of the three.

Content:
The topics that are covered include (not in this order and not always by these names):
1) controlling access to programs, data, and systems
2) controlling overt and covert access to information
3) encryption in general, and encryption of passwords, files, volumes, and network traffic
4) network security in general, simple networks, networks of networks, network protocols in general, Internet protocols, network monitoring, monitoring tools, network applications in general, email, and the web
5) security in large enterprises and in government

Style:
This is a textbook, not a reference book. It is intended to be read sequentially. Several times a topic is considered in the context of an individual computer, then again in the context of a local area network, and finally in the context of the Internet, each time building on the previous discussion. It is well written, easy to understand, and engaging. It includes occasional discussions of historical background or context, including examples of actual computer incidents that illustrate the material being taught. The frequent figures and tables are helpful and the illustrations are interesting. Each chapter ends with a list of important terms that were introduced, a list of acronyms that were introduced, a set of review questions, and a set of exercises. The review questions and exercises are well done and help the reader to retain what's been learned, or to realize that an important idea has been missed. There's an index! And it's a good one! The index (all 47 pages of it, three columns wide) is very thorough and includes key terms and concepts, not just keywords haphazardly selected from the text, as is far too often the case. The book also comes with access to a website with supplementary learning materials, but they're fairly minimal.

Deficiencies:
I read the entire book, very carefully, and found only a few things to criticize:
1) Other than standards and tools that are referred to by name, the book itself does not point to other reading. The companion website and the authors' website both contain links to additional reading, but I would have preferred a bibliography in the book.
2) I thought the discussion of signaling at the electrical level was somewhat confused. Fortunately, this is background material rather than security-relevant content and the confusion does not affect the ideas that the following sections use.
3) The discussion of the network protocol stack was thorough, but I felt it was not as easy to follow as the rest of the text because the need for each layer was not adequately motivated. Again, much of this is background material rather than primary content. Furthermore, it will only seem more difficult to a reader who is not already familiar with the protocol stack.
4) In the discussion of password cracking, I was somewhat unsatisfied by the discussion of attack space and average attack space because I think analysis is easier in terms of total search space, probability of a success for a given length of search, and expected length of search until the first successful crack.
None of these are serious deficiencies.

Summary:
For the intended audience of aspiring information security professionals, and for those who just want a comprehensive introduction to information security, I think this is a most excellent book and I strongly recommend it.

0 of 0 people found the following review helpful.
I was amazed that the book was plastic sealed with an available ...
By reshad
My collage bookstore was selling this book for a much higher price, I got this cheap on Amazon. I thought I might be getting a used book, with an used condition, but when I received my order, I was amazed that the book was plastic sealed with an available access code. Never been used, and was like a brand new book.

About the book itself:

The book is a bit heavy as it has lots of pages. But, very informative.The author didn't put just examples, and his ideas much on the book, but the real facts, and training that you need for Information Security. Good book ,and will keep it for my feature references.

See all 16 customer reviews...

Elementary Information Security, by Richard E. Smith PDF
Elementary Information Security, by Richard E. Smith EPub
Elementary Information Security, by Richard E. Smith Doc
Elementary Information Security, by Richard E. Smith iBooks
Elementary Information Security, by Richard E. Smith rtf
Elementary Information Security, by Richard E. Smith Mobipocket
Elementary Information Security, by Richard E. Smith Kindle

* PDF Ebook Elementary Information Security, by Richard E. Smith Doc

* PDF Ebook Elementary Information Security, by Richard E. Smith Doc

* PDF Ebook Elementary Information Security, by Richard E. Smith Doc
* PDF Ebook Elementary Information Security, by Richard E. Smith Doc

Tidak ada komentar:

Posting Komentar