Cybersecurity

An Introduction

Paperback
June 2020
9781683922032
More details
  • Publisher
    Mercury Learning & Information
  • ISBN 9781683922032
  • Language English
  • Pages 400 pp.
  • Size 7" x 9"
  • Request Exam Copy
$54.95
E-Book
June 2020
9781683922049
More details
  • Publisher
    Mercury Learning & Information
  • ISBN 9781683922049
  • Language English
  • Pages 400 pp.
  • Size 7" x 9"
  • Request E-Exam Copy
$31.95
Lib E-Book

Library E-Books

We have signed up with three aggregators who resell networkable e-book editions of our titles to academic libraries. These aggregators offer a variety of plans to libraries, such as simultaneous access by multiple library patrons, and access to portions of titles at a fraction of list price under what is commonly referred to as a “patron-driven demand” model.

These editions, priced at par with simultaneous hardcover editions of our titles, are not available direct from Stylus, but only from the following aggregators:

  • Ebook Library, a service of Ebooks Corporation Ltd. of Australia
  • ebrary, based in Palo Alto, a subsidiary of ProQuest
  • EBSCO / netLibrary, Alabama

as well as through the following wholesalers: The Yankee Book Peddler subsidiary of Baker & Taylor, Inc.

June 2020
9781683922735
More details
  • Publisher
    Mercury Learning & Information
  • ISBN 9781683922735
  • Language English
  • Pages 400 pp.
  • Size 7" x 9"
$124.95

Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous examples and practical applications. As the field of cybersecurity has moved beyond computer networks and the Internet into phones, the Internet of Things, and autonomous vehicles, it advocates a comprehensive approach to security that emphasizes not only techniques but also the mindset. The book includes an introduction to networks, backups, history of the field, career information, and a glossary of key terms including US government acronyms. Emphasizing the key components of information security, key topics include physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operations centers, quarantines, and sandboxing.

Features:

• Examples to help the reader learn to identify suspect activity

• Promotes an approach that emphasizes preparation and prevention while describing the tools and techniques in detection of problems and steps for recovery

Selected Topics:

Physical security, communication security, software protection of systems, encryption, intrusion detection, recovery, policies, controls, filtering, firewalls, proxies, security operations centers, quarantines, sandboxing, networks, backups, a history of the field, career information, and a glossary of key terms including US government acronyms.

Sean Westcott

Sean Westcott has worked in electronics, networking and cybersecurity. He is a co-author of The Complete Idiot’s Guide to Electronics 101 (Alpha/Penguin Books) and Digitally Daunted: The Consumer's Guide to Taking Control of the Electronics in Your Life (Capital Books). His Twitter handle is @basementhacker.

Jean Riescher Westcott

Jean Riescher Westcott has written broadly on technology in books and online. She is a co-author of The Complete Idiot’s Guide to Electronics 101 (Alpha/Penguin Books) and Digitally Daunted: The Consumer's Guide to Taking Control of the Electronics in Your Life (Capital Books).