<p/><br></br><p><b> About the Book </b></p></br></br>Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring. Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the publics awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring. This new, updated, fourth edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analyzed in detail.<p/><br></br><p><b> Book Synopsis </b></p></br></br><p>In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individuals who build the hardware and design and develop the software that run the networks that store our vital information. Addressing security issues with ever-growing social networks are two new chapters: "Security of Mobile Systems" and "Security in the Cloud Infrastructure." Instructors considering this book for use in a course may request an examination copy here.</p><p/><br></br><p><b> Review Quotes </b></p></br></br><br><b>Reviews of the third edition: </b> "excellent...highly detailed"--<i>Choice</i>; "a thoughtful, informed, and informative look at electronic malice and its consequences...highly recommended"--<i>Midwest Book Review</i>; "a useful introduction...libraries will want to consider this for purchase"--<i>Counterpoise.</i><br><p/><br></br><p><b> About the Author </b></p></br></br><b>Joseph Migga Kizza</b> has written multiple books on information ethics and is a professor of computer science at the University of Tennessee at Chattanooga.
Price Archive shows prices from various stores, lets you see history and find the cheapest. There is no actual sale on the website. For all support, inquiry and suggestion messagescommunication@pricearchive.us