Picture 1 of 2

Gallery
Picture 1 of 2


Have one to sell?
ELEMENTARY INFORMATION SECURITY by Richard E. Smith FREE Shipping!
US $8.99
ApproximatelyRM 37.86
Condition:
“Pre-Owned Like New Condition!”
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free USPS Media MailTM.
Located in: Hallsville, Texas, United States
Delivery:
Estimated between Fri, 31 Oct and Fri, 7 Nov to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:382636605295
Item specifics
- Condition
- Like New
- Seller Notes
- “Pre-Owned Like New Condition!”
- Binding
- Paperback
- Weight
- 3.26 lbs
- Product Group
- Book
- IsTextBook
- No
- Topic
- Security
- Educational Level
- College
- Product Type
- Textbook
- ISBN
- 9781449648206
About this product
Product Identifiers
Publisher
Jones & Bartlett Learning, LLC
ISBN-10
1449648207
ISBN-13
9781449648206
eBay Product ID (ePID)
109078567
Product Key Features
Number of Pages
892 Pages
Publication Name
Elementary Information Security
Language
English
Subject
Security / General, Security / Networking
Publication Year
2011
Features
New Edition
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.8 in
Item Weight
52.1 Oz
Item Length
9.2 in
Item Width
7.5 in
Additional Product Features
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter 1: Security From the Ground Up Chapter 2: Controlling a Computer Chapter 3: Controlling Files Chapter 4: Sharing Files Chapter 5: Storing Files Chapter 6: Authenticating People Chapter 7: Encrypting Files Chapter 8: Secret and Public Keys Chapter 9: Encrypting Volumes Chapter 10: Connecting Computers Chapter 11: Networks of Networks Chapter 12: End-to-End Networking Chapter 13: Enterprise Computing Chapter 14: Network Encryption Chapter 15: Internet Services and Email Chapter 16: The World Wide Web Chapter 17: Governments and Secrecy
Edition Description
New Edition
Synopsis
Elementary Information Security is certified to comply fully with the NSTISSI 4011: the federal training standard for information security professionals Comprehensive and accessible, Elementary Information Security covers the entire range of topics required for US government courseware certification NSTISSI 4011 and urges students to analyze a variety of security problems while gaining experience with basic tools of the trade. Written for the one-term undergraduate course, the text emphasizes both the technical and non-technical aspects of information security and uses practical examples and real-world assessment tools. Early chapters in the text discuss individual computers and small LANS, while later chapters deal with distributed site security and the Internet. Cryptographic topics follow the same progression, starting on a single computer and evolving to Internet-level connectivity. Mathematical concepts throughout the text are defined and tutorials with mathematical tools are provided to ensure students grasp the information at hand. Rather than emphasizing memorization, this text challenges students to learn how to analyze a variety of security problems and gain experience with the basic tools of this growing trade. Key Features: -Covers all topics required by the US government curriculum standard NSTISSI 4011. - Unlike other texts on the topic, the author goes beyond defining the math concepts and provides students with tutorials and practice with mathematical tools, making the text appropriate for a broad range of readers. - Problem Definitions describe a practical situation that includes a security dilemma. - Technology Introductions provide a practical explanation of security technology to be used in the specific chapters - Implementation Examples show the technology being used to enforce the security policy at hand - Residual Risks describe the limitations to the technology and illustrate various tasks against it. - Each chapter includes worked examples of techniques students will need to be successful in the course. For instance, there will be numerous examples of how to calculate the number of attempts needed to crack secret information in particular formats; PINs, passwords and encryption keys. Instructor resources include an Instructor's Manual, PowerPoint Lecture outlines, and a complete Test Bank.
LC Classification Number
QA76.9.A25S652 2013
Item description from the seller
Seller feedback (2,215)
- c***r (332)- Feedback left by buyer.Past 6 monthsVerified purchaseFast shipping, exactly as described, great condition, packed well and great deal. Recommended seller! ThanksSkeleton Warriors DAGGER - 1994 6" Action Figure - Loose Complete by Playmates (#387244995540)
- 2***i (2278)- Feedback left by buyer.Past 6 monthsVerified purchaseItem received in good condition, good appearance, as described. Packed well & shipped quick.THE NEGOTIATOR - 1989 HB by Frederick Forsyth "Mystery Novel" FREE Shipping! (#384886173259)
- 4***l (1327)- Feedback left by buyer.Past 6 monthsVerified purchaseRecipient is happy with gift! Great merchandise, price and delivery. PEACE&LUV, Dr. VK WilliamsSUNDOWN TOWNS - 2005 HB Hidden Dimension of American Racism by James W. Loewen (#286106460082)
More to explore :
- Richard Laymon,
- Nonfiction Books Fiction & Ships,
- Richard Scarry Fiction & Books,
- Nonfiction Ships Paperbacks Books,
- Richard Scarry Books for Children,
- History Nonfiction Books & Fiction Ships,
- Nonfiction Books Fiction & Richard Simmons,
- Richard Scarry Fiction Christmas Fiction & Books,
- Richard Simmons Nonfiction Books & Fiction Cookbooks,
- Richard Scarry Fiction Cars Fiction & Books

