Once you're satisfied with your customized book, you will have a print-on-demand book that can be purchased by students in the same way they purchase other course material. Browse through our list of published titles. These books are examples of original manuscripts created in partnership with local Custom Field Editors. They have been authored by instructors at specific campuses, but are readily available for adoption.
Pearson Learning Solutions will partner with you to select or create eBooks, custom eBooks, online learning courses, resource materials, teaching content, media resources and media supplements.
Simply share your course goals with our world-class experts, and they will offer you a selection of outstanding, up-to-the-minute solutions.
Pearson Learning Solutions offers a broad range of courses and custom solutions for web-enhanced, blended and online learning. Our course content is developed by a team of respected subject matter experts and experienced eLearning instructional designers. All course content is designed around specific learning objectives. Looking for technical support for your Pearson course materials? Pearson Always Learning.
Browse by discipline. Sign in or sign up Find your rep Exam copy bookbag. Sign in to the Instructor Resource Centre. Instructor Resource Centre File Download close. Cancel I accept, proceed with download. You can preview this product in two ways: View online at VitalSource. Updating your exam copy bookbag….
Share this page. Print this content. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science.
The result is a presentation of the material that is accessible to students of all levels. Features Accessible to the general-knowledge reader. Topics covered include: o Common cyberattacks including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. Table of Contents 1 Introduction 1 1. About the Author s Michael Goodrich received his Ph. If You feel that this book is belong to you and you want to unpublish it, Please Contact us.
Introduction to Computer Security. Download e-Book. Posted on. Page Count. Please try again. The work is protected by local and international copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning.
You have successfully signed out and will be required to sign back in should you need to download more resources. Introduction to Computer Security. Availability Available. Description For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence e. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science.
The result is a presentation of the material that is accessible to students of all levels. Preface Preface is available for download in PDF format. Accessible to the general-knowledge reader. Topics covered include: o Common cyberattacks including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. Table of Contents 1 Introduction 1 1. Share a link to All Resources.
Instructor Resources. Discipline Resources. About the Author s. Relevant Courses. Sign In We're sorry! Username Password Forgot your username or password?
Sign Up Already have an access code?
0コメント