Published August 23, 2012
Textbook - 236 Pages - 59 B/W Illustrations
ISBN 9781466517578 - CAT# KE16828
For Instructors Request Inspection Copy
Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:
Explaining how to secure a computer against malware and cyber attacks, the text’s wide-ranging coverage includes security analyzers, firewalls, antivirus software, file shredding, file encryption, and anti-loggers. It reviews international and U.S. federal laws and legal initiatives aimed at providing a legal infrastructure for what transpires over the Internet. The book concludes by examining the role of the U.S. Department of Homeland Security in our country’s cyber preparedness.
Exercises with solutions, updated references, electronic presentations, evaluation criteria for projects, guidelines to project preparations, and teaching suggestions are available upon qualified course adoption.
Vulnerabilities in Information Systems
Avoiding Vulnerabilities through Secure Coding
Mistakes Can Be Good
Threat Modeling Process
Security Starts at Home
Security in Applications
Vulnerabilities in the Organization
Risks in Information Systems Infrastructure
Secure Information Systems
Resource Access Control Facility
Securing the Email Communications
Email Server Side
Email Client Side
Information Security Management
Cybersecurity and the CIO
Building a Secure Organization
Cyberspace and the Law
Cyber Warfare and Homeland Security
…a timely read, and even more so, a trusted resource … covers a great deal of ground very well and its tutorial and comprehensive checklist style pulls even the risk discussions together in an understandable and educational manner that reinforces awareness to the critical attributes found within this manmade domain. … each individual chapter deals with an important and realistic aspect of cybersecurity together with the vulnerabilities and risks. Together, the chapters provide a first-rate overview of this exceedingly complex topic, a perspective that has equally horizontal as well as vertical implications, and will keep the reader cognizant of the interrelationships among the disparate disciplines making up cyberspace.
—Riley Repko, CEO, Trusted Cyber Solutions LLC & Senior Research Fellow, Virginia Tech University
We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption.