2018 Computer Science Catalog

Page 1

www.jblearning.com

COMPUTER SCIENCE ACADEMIC CATALOG 2018

tive Innova Course ns Solutio Inside!


THE JONES & BARTLETT LEARNING DIFFERENCE At Jones & Bartlett Learning, our commitment to creating high-quality print and online learning solutions is revolutionizing how instructors teach and how students and professionals learn. We develop educational programs and services that improve learning outcomes and enhance student achievement by combining authoritative content written by respected authors with innovative, proven, and engaging technology applications that meet the diverse needs of today’s instructors, students, and professionals. Our experienced Account Managers will work with you to match our titles and technology learning solutions to your unique curriculum. Facebook www.fb.com/JBLCyber Twitter: @JBLearning Instagram @jblearning Blog: blogs.jblearning.com/computer-science LinkedIn: www.linkedin.com/company/jones-&-bartlett-learning Email Updates: www.jblearning.com/eUpdates

For more information, call 1-800-832-0034 or visit www.jblearning.com.

SUPERIOR CUSTOMER SERVICE Personal, responsive service is the hallmark of Jones & Bartlett Learning. Our Account Managers are dedicated to providing you with the best customer service. Your questions and concerns are our priority. Let us know how we can help.

4 Easy Ways to Order

Textbook Examination Copies

1. Toll Free: 1-800-832-0034

Complimentary review copies are

2. Fax: 978-443-8000

available for qualified instructors who wish

3. Mail: Jones & Bartlett Learning

to consider a text for course adoption.

5 Wall Street

For fastest service, make your request

Burlington, MA 01803

online at www.jblearning.com, or let our

4. Web: www.jblearning.com For additional ordering information, turn to page 31.

Image Credits: Cover: Š Cecilie_Arcurs/GettyImages. Source Code: CSCat2018

knowledgeable Account Managers help you find the text that best meets your course needs.


CONTENTS Introductory Computer Science

6

Programming

7-8

Web Design

9-10

Mobile Programming

11-12

Data Structures

13

Computer Organization & Architecture

14-15

Theory of Computation

16

Algorithms

17

Math for Computer Science

18

Databases

19

Software Engineering

20

Computer Security & Ethics

21-29

Navigate 2

30

Contact Us

31

ENHANCE TEACHING AND LEARNING WITH STUDENT AND INSTRUCTOR SUPPORT MATERIALS For the Student—

For the Educator—

To meet the needs of today’s students,

Many of our core textbooks are

we have developed numerous interactive

accompanied by print and online

and engaging learning resources. Look

resources that support and enhance the

for Student Resources listed under

teaching process. Look for Instructor

specific titles to see the range of options

Resources listed under specific titles to

available.

see the range of options available.

Student Resources:

Instructor Resources:

AR = Additional Resources CL = CodeLab CW = Navigate Companion Website EB = eBook FL = Interactive Flashcards IG = Interactive Glossary LM = Lab Manual LO = Lecture Outlines PQ = Practice Quizzes SC = Source Code SI = Simulations WA = WebAssign

AE = Answers to Exercises AR = Additional Resources CL = CodeLab EB = eBook IB = Image Bank IM = Instructor’s Manual LM = Lab Manual LO = Lecture Outline PP = Slides in PowerPoint Format PS = Project Solutions SC = Source Code SL = Sample Syllabus SM = Solutions Manual TB = Testbank TG = Transition Guide WA = WebAssign 3


“I am very pleased with every aspect of this project. Setting up our instance of Blackboard Learn to receive content was a breeze; the directions were very clear and easy to follow. After the content was uploaded into our site, every bit of it fell perfectly into place. Dan, our client solutions manager was very responsive and incredibly helpful. I did not feel like I was working with a large corporate entity or some support desk in an undisclosed location. I feel like we have a Jones & Bartlett Learning office just up the hall. This level of support is the gold standard in our industry and we appreciate that kind of service.” George Finkle, Senior Instructional Applications Administrator, Henderson State University

We’ve been collaborating with faculty just like you to enhance the teaching and learning experience. Here are just a few of the solutions and services we offer. New test bank development Sample syllabus and course outline creation Full program mapping (with customer selected texts) Custom PowerPoint slides and interactive lectures Full, or augmented course development Instructional designer consultation and course assessment

CUSTOM DEVELOPMENT

LABS, HOMEWORK & COURSE SOLUTIONS

PUBLISH: CUSTOM TEXTBOOKS

ADAPTIVE LEARNING & ANALYTICS

COURSE CONTENT MAPPING

TESTPREP

LMS COURSE DELIVERY

TRAINING & SUPPORT

To learn more visit www.jblearning.com/custom or complete the request form at customsolutions.jblearning.com/contact.html to be contacted by a client solutions manager today. *Single sign-on access is not yet available.

People © Rawpixel.com/Shutterstock.


ISSA A Leader in Cybersecurity & Cyberdefense Education

See What’s NEW with the Virtual Security Cloud Labs! Jones & Bartlett Learning offers students a fully immersive mock IT infrastructure where students can test their skills with realistic security scenarios in a safe learning environment. See page 26 for more details

CodeLab is the leading web-based interactive programming exercise system for introductory programming courses in Python, Java, C++, C, JavaScript, C#, Visual Basics, and SQL. CodeLab is a seasoned system that has been used in over 350 institutions in 20 countries and analyzes over 60 million exercise submissions from more than 150,000 students.

Each CodeLab has between 350 and 800 short exercises, each focused on a particular programming idea or language construct. The student types in code and the system immediately judges its correctness, offering hints when the submission is incorrect. Through this process, the student gains mastery over the semantics, syntax, and common usage of the language elements.

To Learn More, Contact Your Account Manager or Visit turingscraft.com


INTRODUCTORY COMPUTER SCIENCE

Computer Science Illuminated SIXTH EDITION

BESTSELLING!

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Nell Dale, The University of Texas, Austin John Lewis, Virginia Tech

The sixth edition of the best-selling Computer Science Illuminated retains the accessibility and in-depth coverage of previous editions, while incorporating all-new material on cutting edge issues in computer science. Authored by the award-winning Nell Dale and John Lewis, the Sixth Edition’s unique and innovative layered approach moves through the levels of computing from an organized language-neutral perspectives.

KEY FEATURES • Includes Navigate 2 Advantage Access with complete eBook, animations, lab manual, assessments, programming language chapters, and more • Completely revised section on HTML and CSS • Updates regarding top-level domains, social networks, and Google Analytics • All new section on Internet management, including ICANN control and net neutrality • New and updated Did You Know callouts are included in the chapter margins • New and revised Ethical Issues and Biographies throughout emphasize the history and breadth of computing • Available in our customizable PUBLISH platform

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-05591-7 • 700 pages • © 2016 Student Resources: AE, EB, IB, LO, PP, TB Instructor Resources: AR, EB, FL, IG, LM, PQ, SI

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-06950-1 • © 2016

http://go.jblearning.com/CSI6e

6

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


PROGRAMMING

Java Illuminated

An Active Leaning Approach FIFTH EDITION

NEW 5TH EDITION!

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Julie Anderson, Rollins College Hervé J. Franceschi, Loyola University Maryland

Written for the one- to three-term introductory programming course, the fifth edition of Java Illuminated: An Active Learning Approach provides learners with an interactive, userfriendly style to learning the Java programming language. Comprehensive yet accessible, the text takes a progressive approach to object-oriented programming, allowing students to build on established skills in order to develop new and increasingly complex classes. An activity-based pedagogy with programming activities, group projects, interactive examples and exercises, and CodeLab access keeps students engaged and motivated throughout the course.

KEY FEATURES • Updated to include Java 8 and 9 throughout the text • JavaFX has replaced Swing in Chapter 4 (Introduction to Graphical Applications), Chapter 12 (Graphical User Interfaces Using Java FX), and in all graphics applications and programming activities throughout the text • A revised Chapter 2 (Programming Building Blocks – Java Basics) now uses jshell sandbox for immediate code feedback

• Every new print copy includes access to Turing’s Craft CodeLab

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, animations, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-14099-6 • 1,200 pages • © 2019 Instructor Resources: AE, EB, CL, LO, PP, SC, SM, TB, TG StudentResources: EB, CL, FL, IG, PQ, SC, SI

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-14110-8 • © 2019

http://go.jblearning.com/Java5e

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

7


PROGRAMMING

Includes CodeLab!

Includes CodeLab!

Programming and Problem Solving with C++

Python Programming in Context

COMPREHENSIVE SIXTH EDITION

SECOND EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS

Bradley N. Miller David L. Ranum Both of Luther College

Nell Dale, The University of Texas, Austin Chip Weems, University of Massachusetts, Amherst

This best-selling text, now in its sixth edition, remains the single clearest and most comprehensive introduction to C++, object-oriented programming, and software development available. Renowned author team Nell Dale and Chip Weems present a studentcentered, pragmatic, and hands-on approach.

KEY FEATURES • Features strong pedagogical elements, including real-world case studies and highly relevant exercises that reinforce key concepts • Contains new programming exercises throughout, and a new, more student-friendly organization of material • Introduces C++ language constructs in parallel with the appropriate theory so students can see and understand its practical application

Python Programming in Context provides a comprehensive, accessible introduction to Python fundamentals. Building on essential concepts of computer science and offering a plentitude of real-world examples, this text offers a thorough overview of multiple applied areas, including image processing, cryptography, astronomy, the Internet, and bioinformatics.

KEY FEATURES • Utilizes Python 3 throughout • Provides a clear, accessible, and skill-focused approach to programming with Python • Awarded a “Textbook Excellence Award” (Texty) from the Text and Academic Authors Associate (TAA) ISBN: 978-1-4496-9939-0 Paperback with Access Code 498 pages • © 2014 Instructor Resources: AE, CL, PP, SC, TB Student Resources: CL, SC http://go.jblearning.com/Python2e

Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-07919-7 • 1,068 pages • © 2014 Instructor Resources: AE, CL, EB, LM, LO, PP, SC, TB Student Resources: EB, CL, IG, LM, PQ, SC http://go.jblearning.com/PPSEnhanced

8

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


WEB DESIGN

Web Programming with HTML5, CSS, and JavaScript

NEW

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS John Dean, Park University

Web Programming with HTML5, CSS, and JavaScript is written for the undergraduate, web programming course and is appropriate for students with or without programming experience. It covers the three client-side technologies (HTML5, CSS, and JavaScript) in depth, with no dependence on server-side technologies. One of the distinguishing features of this new text is its coverage of Canvas, one of the most important new features of HTML5. Throughout the text, topics are presented in a logical, comprehensive manner and code is presented in both short code fragments and complete web pages, allowing readers to grasp concepts quickly and then apply the concepts in the context of a complete web page. The chapters include optional case-study sections, which present the incremental development of a sophisticated website. The case studies allow students to apply what they have learned, providing them with a sense of the real-world design process.

KEY FEATURES • Written in a fun, conversational tone to engage readers in the learning process • Presents content in a way that helps develop creativity and problem-solving skills • Incorporates interesting case studies at the close of each chapter that discuss the creation of an increasingly sophisticated website

• Strikes an appropriate balance between short code fragments and complete web pages so readers are able to grasp new concepts quickly and apply those concepts in the context of complete web pages • Includes three types of homework problems at the end of each chapter—review questions, exercises and projects • Instructor resources include Slides in PowerPoint format, Exercise and Project solutions, Test Bank, and Additional Projects

Navigate 2 Advantage Access

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, additional projects, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN 978-1-284-09179-3 • 678 pages • © 2019 Instructor Resources: SC, PP, ES, PS, TB, AR, EB, LO, SM Student Resources: SC, PQ, LO, EB

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-09215-8 • © 2019

http://go.jblearning.com/webprogramming

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

9


WEB DESIGN

Web Programming and Internet Technologies An E-Commerce Approach SECOND EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Porter Scobey, PhD Pawan Lingras, PhD Both of Saint Mary’s University, Halifax

Revised and updated with the latest data from the field, Web Programming and Internet Technologies: An E-Commerce Approach, Second Edition continues to feature a handson and active learning approach. Written for the one-term web programming course for first or second year students, the Second Edition introduces students to the fundamental techniques of web programming through the continual development of a real-world business example. Students learn the basics of HTML5, CSS3, JavaScript, PHP, and MySQL and apply their knowledge to construct their own fully functional e-commerce site.

KEY FEATURES • NEW – Updated throughout to include HTML5, CSS3, JavaScript, and PHP • NEW – Includes an introduction to responsive web design • NEW – Includes an introduction to AJAX • USER FAVORITE – Presents a real world case study in each chapter using the example of Nature’s Source, a business that sells health products online

• USER FAVORITE – Each chapter concludes with updated resources to test student comprehension, including Quick Questions to Test Your Basic Knowledge, Short Exercises to Improve Your Basic Understanding, Exercises on the Parallel Project, and What Else You May Want or Need to Know • UPDATED – Instructor Resources including slides in PowerPoint format, answers to the endof- chapter questions, and an expanded Test Bank

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-07068-2 • 580 pages • © 2018 Instructor Resources: AE, IB, IM, PP, SC, TB, TG Student Resources: AR, EB, LO, PQ, SC

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-07074-3 • © 2018

http://go.jblearning.com/Scobey2e

10

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


MOBILE PROGRAMMING

Android App Development INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Hervé J. Franceschi, Loyola University Maryland

Using innovative, engaging methods, Android App Development cultivates student knowledge of app development through a progressive, building block approach. Each chapter includes a classroom-friendly, meaningful app that illustrates the concepts covered at the chapter level. Model View Controller architecture is used throughout the book to promote good software engineering practice. Students will be engaged by essential as well as specialized topics such as XML resources, event-driven programming, animation, sounds, making a game, voice recognition, and more.

KEY FEATURES • Android Studio, the official development environment by Google, is used to develop all applications • The Model View Controller architecture is used throughout the book, allowing the instructor to download the Model and concentrate on the View and Controller elements of the app • Students learn how to make deviceindependent apps using a progressive approach, incorporating fun topics such as animation, sounds, photo editing, using the GPS, displaying a map, and advertising • Software Engineering and Common Error boxes highlight software engineering tips and common errors throughout each chapter

• Chapters are written independently of others so that instructors can select topics and customize the book to their course • Each chapter concludes with exercises for student practice, including Multiple Choice, Fill In the Code, and Write an App exercises

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-09212-7 • 682 pages • © 2018 Instructor Resources: AE, IM, PP, SC, TB Student Resources: AR, EB, LO, PQ, SC

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-09318-6 • © 2018

http://go.jblearning.com/Franceschi

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

11


MOBILE PROGRAMMING

Android Programming Concepts INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Trish Cornez Richard Cornez Both of University of Redlands

Using a hands-on, student-friendly approach, Android Programming Concepts provides a comprehensive foundation for the development of mobile applications for devices and tablets powered by Android. This text offers in-depth coverage of the topics outlined by the official Android developer API guides, leading a programmer with object-oriented programming skills through the app development process. Each chapter features a collection of welldesigned and classroom-tested lab examples, providing an opportunity to apply specific Android concepts while supported by visual guides, explanations, and code listings.

KEY FEATURES • Android Studio, the official development environment by Google, is used to develop all applications • Includes 44 practical and interesting lab examples linked to real-world mobile problems, including constructing games with moving graphics • Mobile programming commences in Chapter 1 with the development of two native Android applications, beginning with a problem statement and storyboard and ending with an executable app

• Each chapter concludes with skill-oriented questions designed to test comprehension of key concepts

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-07070-5 • 834 pages • © 2017 Instructor Resources: AE, EB, IB, LO, PP, SC, TB Student Resources: EB, LO, PP, PQ, SC

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-07075-0 • © 2017

http://go.jblearning.com/Android

12

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


DATA STRUCTURES

C++ Plus Data Structures SIXTH EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Nell Dale, PhD, University of Texas, Austin Chip Weems, University of Massachusetts, Amherst Tim Richards, University of Massachusetts, Amherst

C++ Plus Data Structures, Sixth Edition explores the specifications, applications, and implementations of abstract data types with unmatched accessibility. Topics such as modularization, data encapsulation, information hiding, and much more are carefully presented to foster solid software engineering technique

NEW & KEY FEATURES OF THE SIXTH EDITION • UPDATED – Updated with new C++11 features including range-based for loops and threads • NEW – Includes a new Chapter 10, Trees Plus, that emphasizes balancing of search trees by covering AVL Trees, Red-Black Trees, and B-Trees • NEW – Includes a new chapter on Sets, Maps, and Hashing

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-08918-9 • 838 pages • © 2018 Instructor Resources: AE, IM, PP, SC, TB, TG Student Resources: AR, EB, FL, LO, PQ, SC http://go.jblearning.com/cplusds6e

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-08921-9 • © 2018

Object-Oriented Data Structures Using Java FOURTH EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Nell Dale, PhD, University of Texas, Austin Daniel T. Joyce, Villanova University Chip Weems, University of Massachusetts, Amherst

Object-Oriented Data Structures Using Java, Fourth Edition is an essential resource for students learning data structures using the Java programming language. It presents both the traditional and modern data structure topics with an emphasis on problemsolving and objectoriented software design.

KEY FEATURES • NEW - Includes chapters on the Map ADT and the Collection ADT • NEW - Sections highlighting variations on the standard data structures, including a look at how the structures are supported by the Java Standard Library • NEW - New sections and examples introduce important topics such as image generation, recursive processing of arrays and linked lists, fractals, games, and text analysis

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-08909-7 • 694 pages • © 2018 Instructor Resources: AE, PP, SC, TB, TG Student Resources: EB, FL, LO, PQ, SC http://go.jblearning.com/oods4e

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-08920-2 • © 2018

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

13


COMPUTER ORGANIZATION & ARCHITECTURE

The Essentials of Computer Organization and Architecture

NEW 5TH EDITION!

FIFTH EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Linda Null, Pennsylvania State University Julia Lobur, Pennsylvania State University

Bestselling text, The Essentials of Computer Organization and Architecture, Fifth Edition, is comprehensive enough to address all necessary organization and architecture topics, but concise enough to be appropriate for a single-term course. Its focus on real-world examples and practical applications encourages students to develop a “big-picture” understanding of how essential organization and architecture concepts are applied in the computing world. In addition to direct correlation with the ACM/ IEEE guidelines for computer organization and architecture, the text exposes readers to the inner workings of a modern digital computer through an integrated presentation of fundamental concepts and principles.

KEY FEATURES • NEW - Null Pointers side bars include helpful hints to simplify concepts students typically struggle with • Streamlined presentation of content with material not deemed “essential” available online

• Discussion of hardware updated and expanded throughout • The MARIE Simulator package allows students to learn the essential concepts of computer organization and architecture, including assembly language, without getting caught up in unnecessary and confusing details

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-12303-6 • 880 pages • © 2019 Instructor Resources: IM, PP, TB, EB Student Resources: EB, FL, LO, PQ, AR

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-12305-0 • © 2019

http://go.jblearning.com/Null5e

14

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


COMPUTER ORGANIZATION & ARCHITECTURE

Computer Systems FIFTH EDITION J. Stanley Warford, Pepperdine University

Updated throughout with the latest updates as well as the new Pep/9 virtual machine, Computer Systems, Fifth Edition provides a clear, detailed, step-by-step introduction to the central concepts in computer organization, assembly language, and computer architecture. It urges students to explore the many dimensions of computer systems through a top-down approach to levels of abstraction. By examining how the different levels of abstraction relate to one another, the text helps students look at computer systems and their components as a unified concept.

KEY FEATURES • New high-order language—The high-order language is changed from C++ to C, the language more commonly used in computer systems • New sidebars—Each sidebar is a real-world example of the concepts described in that chapter. As most of the chapters describe the Pep/9 virtual machine, the sidebars for those chapters show corresponding implementations for the Intel x86 architecture • New and expanded topics—New and expanded topics include, QR codes, color displays, Unicode, UTF-32 and UTF-8 encoding, floating point underflow, bigendian and little-endian order, memory alignment issues, and expanded RISC design principles and MIPS coverage to contrast with the Pep/9 CISC design • New virtual machine—Pep/8, the virtual machine for the two previous editions, is now superseded by the new and improved Pep/9

TABLE OF CONTENTS Level 7 Application Chapter 1 Computer Systems Level 6 High-Order Language Chapter 2 C Level 3 Instruction Set Architecture Chapter 3 Information Representation Chapter 4 Computer Architecture Level 5 Assembly Chapter 5 Assembly Language Chapter 6 Compiling to the Assembly Level Chapter 7 Language Translation Principles

Level 4 Operating System Chapter 8 Process Management Chapter 9 Storage Management Level 1 Logic Gate Chapter 10 Combinational Circuits Chapter 11 Sequential Circuits Level 2 Microcode Chapter 12 Computer Organization Appendix Solutions to Selected Exercises Index

ISBN: 978-1-284-07963-0 • Hardcover • 824 pages • © 2017 Instructor Resources: AR, PP, SM http://go.jblearning.com/Warford5e

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

15


THEORY OF COMPUTATION

An Introduction to Formal Languages and Automata SIXTH EDITION Peter Linz, University of California, Davis

An Introduction to Formal Languages and Automata, Sixth Edition provides an accessible, student-friendly presentation of all material essential to an introductory Theory of Computation course. Written to address the fundamentals of formal languages, automata, and computability, the text is designed to familiarize students with the foundations and principles of computer science and to strengthen the students’ ability to carry out formal and rigorous mathematical arguments. The author, Peter Linz, continues to offer a straightforward, uncomplicated treatment of formal languages and automata and avoids excessive mathematical detail allowing students to focus on and understand the key underlying principles.

KEY FEATURES

CONTENTS

• An accessible approach allows students to clearly understand key content while retaining the appropriate mathematical notations and theorems required for the course • New Chapter Synopsis, found at the beginning of each chapter, recaps important concepts found in the text • Every major idea is preceded by a motivating example, drawn from applications, that introduces the concept and illustrates its usefulness • New Exercises added throughout, with accessible exercises more closely tied to examples in the text • An enhanced Instructor’s Manual includes more detailed solutions to all problems found in the text • Bundle with JFLAP, An Interactive Formal Languages and Automata Package (ISBN: 978-0-7637-3834-1)

Chapter 1 Introduction to the Theory of Computation Chapter 2 Finite Automata Chapter 3 Regular Languages and Regular Grammars Chapter 4 Properties of Regular Languages Chapter 5 Context-Free Languages Chapter 6 Simplification of Context-Free Grammars and Normal Forms Chapter 7 Pushdown Automata Chapter 8 Properties of Context-Free Languages Chapter 9 Turing Machines Chapter 10 Other Models of Turing Machines Chapter 11 A Hierarchy of Formal Languages and Automata Chapter 12 Limits of Algorithmic Computation Chapter 13 Other Models of Computation Chapter 14 An Overview of Computational Complexity

ISBN: 978-1-284-07724-7 • Hardcover • 450 pages • © 2017 Instructor Resources: IB, IM, PP http://go.jblearning.com/Linz6e

16

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


ALGORITHMS

Foundations of Algorithms FIFTH EDITION Richard E. Neapolitan, Northwestern University

Foundations of Algorithms, Fifth Edition offers a well-balanced presentation of algorithm design, complexity analysis of algorithms, and computational complexity. Ideal for any computer science student with a background in college algebra and discrete structures, the text presents mathematical concepts using standard English and simple notation to maximize accessibility and user-friendliness. The revised and updated Fifth Edition features an all-new chapter on genetic algorithms and genetic programming, including approximate solutions to the traveling salesperson problem, an algorithm for an artificial ant that navigates along a trail of food, and an application to financial trading. With fully updated exercises and examples throughout and improved instructor resources including complete solutions, an Instructor’s Manual and Lecture Slides, Foundations of Algorithms is an essential text for undergraduate and graduate courses in the design and analysis of algorithms.

KEY FEATURES

CONTENTS

• The only text of its kind with a chapter on genetic algorithms and genetic programming • Use of C++ and Java pseudocode help students better understand complex algorithms • No calculus background required • Numerous clear and student-friendly examples throughout • Fully updated exercises and examples throughout • Improved instructor resources including revised problem solutions, test questions, and lecture outlines in PowerPoint format

Chapter 1 Algorithms: Efficiency, Analysis, and Order Chapter 2 Divide-and-Conquer Chapter 3 Dynamic Programming Chapter 4 The Greedy Approach Chapter 5 Backtracking Chapter 6 Branch-and-Bound Chapter 7 Introduction to Computational Complexity: The Sorting Problem Chapter 8 More Computational Complexity: The Searching Problem Chapter 9 Computational Complexity and Intractability: An Introduction to the Theory of NP Chapter 10 Genetic Algorithms Chapter 11 Number-Theoretic Algorithms Chapter 12 Introduction to Parallel Algorithms

ISBN: 978-1-284-04919-0 • Paperback • 676 pages • © 2015 Instructor Resources: IB, IM, SM, PP http://go.jblearning.com/Algorithms

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

17


MATH FOR COMPUTER SCIENCE

Essentials of Discrete Mathematics

Discrete Structures, Logic, and Computability

THIRD EDITION

FOURTH EDITION

David J. Hunter, Westmont College

James L. Hein, Professor Emeritus, Portland State University

Written for the one-term course, Essentials of Discrete Mathematics, Third Edition is designed to serve computer science and mathematics majors, as well as students from a wide range of other disciplines. The mathematical material is organized around five types of thinking: logical, relational, recursive, quantitative, and analytical. This presentation results in a coherent outline that steadily builds upon mathematical sophistication. Graphs are introduced early and referred to throughout the text, providing a richer context for examples and applications. Algorithms are presented near the end of the text, after students have acquired the skills and experience needed to analyze them. The final chapter emphasizes the multidisciplinary approach and contains case studies that integrate the fields of biology, sociology, linguistics, economics, and music.

Updated to align to the latest 2013 ACM/IEEE Computer Science curricula, Discrete Structures, Logic, and Computability, Fourth Edition is designed for the one- to two-term Discrete Mathematics course. The structure of the book supports the spiral method of learning, by first introducing basic information, allowing students to work on the problem, and then revisiting the topic as new information and skills are established. This method, coupled with a studentfriendly and simplified writing style, provides an accessible yet comprehensive level of coverage.

KEY FEATURES

• Student Inquiry Problems, found at the beginning of each section, are designed to introduce and motivate the material in the section that follows • Incorporates new content on Graph Theory • Updated and expanded WebAssign Online Homework and Grading System available for students and instructors. Includes 349 New Exercises!

• Written for prospective computer scientists, computer engineers, or applied mathematicians, who wish to learn about the ideas that underlie computer science • Over 300 new exercises and 125 new examples have been added throughout the text • Includes a new Chapter 10, Graph Theory, expanding the introductory material presented in Chapter 1 • Includes access to the Navigate Student Companion Website, featuring a Student Study Guide and a Lab Book of experiments that use a free open-source mathematics software system

ISBN: 978-1-284-05624-2 Hardcover • 492 pages • © 2017 Instructor Resources: AR, IM, PP, SM, WA Student Resources: WA

ISBN: 978-1-284-07040-8 Hardcover with Access Code • 1,040 pages • © 2017 Instructor Resources: PP, SM, TB Student Resources: CW

KEY FEATURES

http://go.jblearning.com/Hunter3e

18

http://go.jblearning.com/Hein4e

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


DATABASES

Databases Illuminated THIRD EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Catherine M. Ricardo, Iona College Susan D. Urban, Professor Emeritus, Arizona State University

Databases Illuminated, Third Edition combines database theory with a practical approach to database design and implementation. Strong pedagogical features, including accessible language, real-world examples, downloadable code, and engaging hands-on projects and lab exercises create a text with a unique combination of theory and student-oriented activities. Providing an integrated, modern approach to databases, Databases Illuminated, Third Edition is the essential text for students in this expanding field.

KEY FEATURES • Includes a new chapter on the emerging topics of Big Data, NoSQL, and NewSQL • Incorporates revised and expanded coverage on database security, including SQL injection • Includes extended coverage of SQL, with additional material on temporal database queries and JDBC • Provides updated information on social and ethical issues addressing new regulations and global concerns • Uses the open source software LibreOffice, which is available worldwide

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Hardcover with Navigate 2 Advantage Access ISBN: 978-1-284-05694-5 • 718 pages • © 2017 Instructor Resources: AR, EL, IB, IM, LO, PP, SM, SC, TB Student Resources: AR, EB, FL, IG, LM, LO, PQ, SC

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-07709-4 • © 2017

http://go.jblearning.com/Ricardo3e

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

19


SOFTWARE ENGINEERING

Essentials of Software Engineering FOURTH EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Frank Tsui, PhD, Kennesaw State University Orlando Karam, Kennesaw State University Barbara Bernal, Kennesaw State University

Written for the undergraduate, one-term course, Essentials of Software Engineering, Fourth Edition provides students with a systematic engineering approach to software engineering principles and methodologies. Comprehensive, yet concise, the Fourth Edition includes new information on areas of high interest to computer scientists, including Big Data and developing in the cloud. In-depth coverage of key issues, combined with a strong focus on software quality, makes Essentials of Software Engineering, Fourth Edition the perfect text for students entering the fast-growing and lucrative field of software development. The text includes thorough overviews of programming concepts, system analysis and design, principles of software engineering, development and support processes, methodologies, software testing and quality, and product management, while incorporating real-world examples throughout.

KEY FEATURES • New content on designing for Big Data in Chapter 7 • New content on developing for the Cloud in Chapter 9 • Updates on the changes in Agile Development Processes such as Kanban

• Updates on Data Technology such as Hadoop • New short discussion on REST architecture for distributed system design • Online Projects now available with Navigate 2 Advantage Access

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-10600-8 • 334 pages • © 2018 Instructor Resources: AE, PP, SC, SL, TB, TG Student Resources: AR, EB, FL, LO, PQ, SC

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-10634-3 • © 2018

http://go.jblearning.com/Tsui4e

20

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


COMPUTER SECURITY & ETHICS

Cyberethics

Morality and Law in Cyberspace SIXTH EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Richard A. Spinello, Boston College

Written for the undergraduate course, Cyberethics: Morality and Law in Cyberspace, Sixth Edition provides a modern, comprehensive examination of the social costs and moral issues emerging from the ever-expanding use of the Internet and new information technologies, as well as Internet governance and its control by the state. It highlights both the legal and philosophical perspective of content control, free speech, intellectual property, and security. The Sixth Edition includes interesting new case studies on social media, privacy, and the right to be forgotten, which encourages discussion and fosters critical thinking.

KEY FEATURES • Includes new case studies on modern issues such as the Privacy and the Right to be Forgotten, Employers Monitor Social Media and Twitter, and Free Speech and Terrorism • Provides in-depth discussion of net neutrality and Internet governance • Considers the escalating encryption controversy involving the smartphone • Provides a comprehensive look at the privacy and free speech issues arising from the expanded use of social networking

Navigate 2 Advantage Access Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-08139-8 • 244 pages • © 2017 Instructor Resources: EB, IM, LO, PP, TB, SL Student Resources: EB, FL, IG, LO, PQ

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-08145-9 • © 2017

http://go.jblearning.com/Spinello6e

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

21


COMPUTER SECURITY & ETHICS

Elementary Information Security

BESTSELLING!

SECOND EDITION

INCLUDES NAVIGATE 2 ADVANTAGE ACCESS Richard E. Smith

An ideal text for introductory information security course, the second edition of Elementary Information Security provides a comprehensive, yet easy-to-understand introduction to the complex world of cybersecurity and technology. This essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.

KEY FEATURES • Uses the nationally recognized NIST Risk Management Framework to illustrate the cybersecurity process • Comprehensive coverage and full compliance of all topics required for U.S. government courseware certification NSTISSI 4011

Navigate 2 Access Navigate 2 Advantage Access is included with every new print copy of Elementary Information Security, and includes a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Please contact your Account Manager for information on how your students can access virtual security cloud labs to accompany this text.

Option 1: Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-05593-1 • 866 pages • © 2016 Instructor Resources: AR, EB, LO, IB, IM, PP, SL, TB Student Resources: EB, FL, IG, LM, LO, PQ

Option 2: 50% Off Option 1! Navigate 2 Advantage Access Only ISBN: 978-1-284-07126-9 • © 2016

http://go.jblearning.com/Smith2e

22

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


COMPUTER SECURITY & ETHICS

Fundamentals of Information Systems Security

BESTSELLING!

Part of the Information Systems Security and Assurance Curriculum Series

THIRD EDITION David Kim, President and Chief Security Officer, Security Evolutions, Inc., Fairfax, Virginia Michael G. Solomon, PhD, CISSP, PMP, CISM, Solomon Consulting Inc.

Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.

KEY FEATURES • Maps fully to the six major domains of the CompTIA Security+ SYO-401 Certification exam • Updated to include coverage on recent compliance law and standards updates, including FISMA, NIST SP800-171, and PCI DSS v3.2 • New content on advanced malware and APT attacks to the end points such as ransomware and crypto locker

• Addresses data breach and data breach incident response planning • Introduces recent “Internet of Things” risk threats and privacy issues • Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios

ISBN: 978-1-284-11645-8 • Paperback • 548 pages • © 2018 Instructor Resources: AE, AR, IB, IM, LM, PP, SL, TB, TG Student Resources: LM http://go.jblearning.com/Kim3e

Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates

23


COMPUTER SECURITY & ETHICS

System Forensics, Investigation and Response

NEW

THIRD EDITION Chuck Easttom

Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, Part III explores emerging technologies as well as future directions of this interesting and cutting-edge field.

KEY FEATURES • Covers all aspects of forensics: procedures, legal issues, and scientific principles as well as specific hands on forensics with Windows, smart phones, memory, network forensics, and Macintosh forensics • New and expanded content on mobile device forensics, addressing the most current issues • Additional information on memory forensics • Updated and expanded coverage on legal issues • Significantly expanded material on Windows forensics

• Includes information on how to write reports • Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios

ISBN: 978-1-284-12184-1 • Paperback • 336 pages • © 2019 Instructor Resources: AE, AR, IB, IM, LM, PP, SL, TB, TG Student Resources: LM http://go.jblearning.com/Easttom3e

24

5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com


COMPUTER SECURITY & ETHICS

Hacker Techniques, Tools & Incident Handling

Available August 2018

NEW

THIRD EDITION Sean-Philip Oriyano

Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

KEY FEATURES • Includes the latest content and tactics related to hacking and its methodology • Provides updated and expanded content on important techniques • Incorporates the most current hardware, software, and protocols • Coverage of the Internet of Things and how it has expanded attack surfaces

• Additional coverage of what to do if you are attacked • Available with Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios

ISBN: 978-1-284-14780-3 • 450 pages • © 2020 Instructor Resources: AE, AR, IB, IM, LM, PP, SL, TB Student Resources: LM http://go.jblearning.com/Oriyano3e

For a more information on all titles in the Information Systems Security & Assurance Series visit www.issaseries.com

25


ISSA INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

The Jones & Bartlett Learning Information Systems Security & Assurance Series delivers fundamental IT security principles packed with real-world applications and examples for IT Security, Cybersecurity, Information Assurance, and Information Systems Security Programs. This innovative curriculum offers relevant, forward-thinking resources, and hands-on labs to enable your students to investigate and solve the cybersecurity challenges of today and tomorrow.

Features of the Series • 15 textbooks/eBooks each with content divided into 15 chapters • 15 courses, developed for onsite and online use, with full instructor material. Each course includes scenario-based problems where students role-play an IT security practitioner as well as homework assignments, quizzes, exams, and detailed instructor guides and lab manuals • 80 hands-on labs provide a unique, experiential learning environment

And now they’re even better! • NEW Content – All 80 Virtual Security Cloud Labs have been expanded to include a new Applied Learning section and updated Lab Challenge and Analysis section to supplement the existing Hands-On Demonstration • NEW Lab Environment – New features and functionalities available for 3.0, including Progress Tracking, Collapsible Lab Frame, and System Checker • NEW Saved States Feature – No more worrying about completing each lab in one sitting! Students now have the opportunity to save their work before exiting a virtual lab, then return to it later • Updated Software – The 3.0 environment includes updates to the latest Operating Systems and Software, including Windows Server 2016, Nessus Vulnerability Scanner, P2 Commander, Wireshark, and more

Applied Labs to Accompany Fundamentals of Information Systems Security Lab 1: Performing Reconnaissance and Probing using Common Tools Lab 2: Performing a Vulnerability Assessment Lab 3: Enabling Windows Active Directory and User Access Controls Lab 4: Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control Lab 5: Performing Packet Capture and Traffic Analysis Lab 6: Implementing a Business Continuity Plan Lab 7: Using Encryption to Enhance Confidentiality and Integrity Lab 8: Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities Lab 9: Eliminating Threats with a Layered Security Approach Lab 10: Implementing an Information Systems Security Policyoach

Applied Labs to Accompany Network Security, Firewalls, and VPNs Lab 1: Analyzing Protocols with Wireshark Lab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic Lab 3: Configuring a pfSense Firewall on the Client Lab 4: Configuring a pfSense Firewall on the Server Lab 5: Penetration Testing a pfSense Firewall Lab 6: Using Social Engineering Techniques to Plan an Attack Lab 7: Configuring a Virtual Private Network Server Lab 8: Configuring a VPN Client for Secure File Transfer Lab 9: Attacking a Virtual Private Network Lab 10: Investigating and Responding to Network Security Incidents

26


Applied Labs to Accompany Hacker Techniques, Tools, and Incident Handling Lab 1: Assessing and Securing Systems on a Wide Area Network (WAN) Lab 2: Applying Encryption and Hashing Algorithms for Secure Communications Lab 3: Data Gathering and Footprinting on a Targeted Website Lab 4: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation Lab 5: Attacking a Vulnerable Web Application and Database Lab 6: Identifying and Removing Malware on a Windows System Lab 7: Analyzing Network Traffic to Create a Baseline Definition Lab 8: Auditing a Wireless Network and Planning for a Secure WLAN Implementation Lab 9: Investigating and Responding to Security Incidents Lab 10: Securing the Network with an Intrusion Detection System (IDS)

Applied Labs to Accompany System Forensics, Investigation, and Response Lab 1: Applying the Daubert Standard to Forensic Evidence Lab 2: Documenting a Workstation Configuration using Common Forensic Tools Lab 3: Uncovering New Digital Evidence Using Bootable Forensic Utilities Lab 4: Creating a Forensic System Case File for Analyzing Forensic Evidence Lab 5: Analyzing Images to Identify Suspicious or Modified Files Lab 6: Recognizing the Use of Steganography in Image Files Lab 7: Automating E-mail Evidence Discovery Using P2 Commander Lab 8: Decoding an FTP Protocol Session for Forensic Evidence Lab 9: Identifying and Documenting Evidence from a Forensic Investigation Lab 10: Conducting an Incident Response Investigation for a Suspicious Login

Applied Labs to Accompany Access Control, Authentication, and Public Key Infrastructure Lab 1: Configuring an Active Directory Domain Controller Lab 2: Managing Windows Accounts and Organizational Units Lab 3: Configuring Windows File System Permissions Lab 4: Managing Group Policy Objects in Active Directory Lab 5: Configuring Windows Firewall Lab 6: Managing Linux Accounts Lab 7: Configuring Linux File System Permissions Lab 8: Encrypting and Decrypting Files with PKI Lab 9: Authenticating Security Communications with Digital Signatures Lab 10: Encrypting and Decrypting Web Traffic with HTTPS

Applied Labs to Accompany Internet Security: How to Defend Against Attackers on the Web Lab 1: Evaluating Web Server Vulnerabilities Lab 2: Obtaining Personally Identifiable Information through Internet Research Lab 3: Performing a Post-Mortem Review of a Data Breach Incident Lab 4: Exploiting Known Web Vulnerabilities on a Live Web Server Lab 5: Applying OWASP to a Web Security Assessment Lab 6: Applying Regulatory Compliance Standards Lab 7: Performing Dynamic and Static Quality Control Testing Lab 8: Performing an IT and Web Application Security Assessment Lab 9: Recognizing Risks and Threats Associated with Emerging Technologies Lab 10: Implementing a Security Development Lifecycle (SDL) Plan

Applied Labs to Accompany Security Strategies in Windows Platforms and Applications Lab 1: Implementing Access Controls with Windows Active Directory Lab 2: Using Access Control Lists to Modify File System Permissions on Windows Systems Lab 3: Configuring Bitlocker and Windows Encryption Lab 4: Identifying and Removing Malware from Windows Systems Lab 5: Managing Group Policy within the Microsoft Window`s Environment Lab 6: Creating a Scheduled Backup and Replicating System Folders Lab 7: Securing Servers with the Security Configuration Wizard and the Windows Firewall Lab 8: Securing Internet Client and Server Applications on Windows Systems Lab 9: Protecting Digital Evidence, Documentation, and the Chain of Custody Lab 10: Hardening Windows Server Security Using Microsoft Baseline Security Analyzer

27


Applied Labs to Accompany Security Strategies in Linux Platforms and Applications Lab 1: Installing a Core Linux Operating System on a Server Lab 2: Configuring Basic Security Controls on a Centos Linux Server Lab 3: Hardening Security with User Account Management and Security Controls Lab 4: Applying Hardened Linux File System Security Controls Lab 5: Hardening Security for Linux Services and Applications Lab 6: Hardening Security by Controlling Access Lab 7: Hardening Security for the Linux Kernel Lab 8: Applying Best Practices for Security Software Management Lab 9: Applying Best Practices for Security Logging and Monitoring Lab 10: Defining Linux OS and Application Backup and Recovery Procedures

Applied Labs to Accompany Security Policies and Implementation Issues Lab 1: Crafting an Organization-Wide Security Management Policy for Acceptable Use Lab 2: Developing an Organization-Wide Policy Framework Implementation Plan Lab 3: Defining an Information Systems Security Policy Framework for an IT Infrastructure Lab 4: Crafting a Layered Security Management Policy – Separation of Duties Lab 5: Crafting an Organization-Wide Security Awareness Policy-BIA and Recovery Time Lab 6: Defining a Remote Access Policy to Support Remote Health Care Clinics Lab 7: Identifying Necessary Policies for Business Continuity – BIA and Recovery Time Objectives Lab 8: Crafting a Security or Computer Incident Response Policy – CIRT Response Team Lab 9: Assessing and Auditing an Existing IT Security Policy Framework Definition Lab 10: Aligning an IT Security Policy Framework to the Seven Domains of a Typical IT Infrastructure

Applied Labs to Accompany Managing Risk in Information Systems Lab 1: Identifying Threats and Vulnerabilities in an IT Infrastructure Lab 2: Aligning Risks, Threats, & Vulnerabilities to the COBIT P09 Risk Management Controls Lab 3: Defining the Scope and Structure for an IT Risk Management Plan Lab 4: Performing a Qualitative Risk Assessment for an IT Infrastructure Lab 5: Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap® GUI (Nmap) & Nessus® Reports Lab 6: Developing a Risk-Mitigation Plan Outline for an IT Infrastructure Lab 7: Performing a Business Impact Analysis for a Mock IT Infrastructure Lab 8: Developing an Outline for a Business Continuity Plan for an IT Infrastructure Lab 9: Developing Disaster Recovery Backup Procedures and Recovery Instructions Lab 10: Creating a CIRT Response Plan for a Typical IT Infrastructure

Applied Labs to Accompany Legal Issues in Information Security Lab 1: Creating an IT Infrastructure Asset List and Identifying Where Privacy Data Resides Lab 2: Case Study on U.S. Veteran Affairs and Loss of Private Information Lab 3: Case Study on PCI DSS Non-Compliance: CardSystems Solutions Lab 4: Analyzing and Comparing GLBA and HIPAA Lab 5: Case Study on Issues Related to Sharing Consumers’ Confidential Information Lab 6: Identifying the Scope of Your State’s Data and Security Breach Notification Law Lab 7: Case Study on Digital Millennium Copyright Act: Napster Lab 8: Cyberstalking or Cyberbullying and Laws to Protect Individuals Lab 9: Recommending IT Security Policies to Help Mitigate Risk Lab 10: Case Study on Computer Forensics: Pharmaceutical Company

Applied Labs to Accompany Auditing IT Infrastructure for Compliance Lab 1: Assessing the Impact of Sarbanes-Oxley (SOX) Compliance Law on Enron Lab 2: Aligning Auditing Frameworks for a Business Unit Within DoD Lab 3: Defining a Process for Gathering Information Pertaining to a HIPAA Compliance Audit Lab 4: Aligning an IT Security Assessment – Risk, Threats, and Vulnerability Assessments – to Achieve Compliance Lab 5: Defining a Process for Gathering Information Pertaining to a GLBA Compliance Audit Lab 6: Auditing the Workstation Domain for Compliance Lab 7: Auditing the LAN-to-WAN Domain for Compliance Lab 8: Auditing the Remote Access Domain for Compliance Lab 9: Auditing the Systems/Application Domain for Compliance Lab 10: Charting Your Career Path – Professional Certifications

A Complete Curriculum Solution for IT Security, Cybersecurity, Information Assurance, and Information Systems Security Programs 28


Explore NEW Updates to the Virtual Security Cloud Labs! NEW 3.0 LAB ENVIRONMENT

What’s NEW with the Virtual Security Cloud Labs! Jones & Bartlett offers students a fully immersive mock IT infrastructure where they can test their skills with realistic security scenarios in a safe learning environment. Now they’ve gotten even better! With the new Virtual Security Cloud Labs 3.0 you will find:

• NEW Content – All 80 Virtual Security Cloud Labs have been expanded to include a new Applied Learning section and updated Lab Challenge and Analysis section to supplement the existing HandsOn Demonstration • NEW Lab Environment – New features and functionalities available for 3.0, including Progress Tracking, Collapsible Lab Frame, and System Checker • NEW Saved States Feature – No more worrying about completing each lab in one sitting! Students now have the opportunity to save their work before exiting a virtual lab, then return to it later • Updated Software – The 3.0 environment includes updates to the latest Operating Systems and Software, including Windows Server 2016, Nessus Vulnerability Scanner, P2 Commander, Wireshark, and more • Updated Lab Manual – Now consists of the following parts: • • • • • • •

Introduction Learning Objectives Lab Overview (NEW) Instructor Notes (NEW) Tools and Software Deliverables Section 1: Hands-On Demonstration

• Section 2: Applied Learning (NEW) • Section 3: Lab Challenge and Analysis (UPDATED) • Evaluation Criteria and Rubrics • Lab Assessment Worksheet (UPDATED) • Lab Assessment Quiz (UPDATED)

Contact your Account Manager to learn more about the exciting new enhancements to the Virtual Security Cloud Labs! go.jblearning.com/FindMyRep

Check out our hands-on labs and learn more at www.issaseries.com

29


to Expand the Reach of Your Classroom Whether you teach an online, on-ground, or a hybrid course, you can deliver unbeatable value to your students with Navigate 2. Dashboard

eBook

Learn

Practice

Assess

Analyze

A Complete eBook with Interactive Tools

A Virtual Study Center with Robust Practice Activities & Flashcards

A Homework & Assessment Center with Pre-loaded Quizzes & Exams

A Dashboard that Reports Actionable Data

• Fully Hosted by Jones & Bartlett Learning

Try It Today

• Compatible with Blackboard and Other Third-Party Learning Management Systems

Request a Free 60-Day

• FREE with Purchase of the Accompanying Text

your Account Manager. at: www.jblnavigate.com

• Digital-Only Access (No Print Text) Available at up to 50% Off† • Comprehensive Support and Training • Mobile-Ready

†Discount price may vary. Contact your Account Manager for details.

Trial Access by contacting 60 Day Trial Access Available


ORDER WITH EASE Call toll free at 1-800-832-0034 and speak with one of our knowledgeable Account Managers. For fastest service, place your order at www.jblearning.com.

Contact Your Account Specialist Two- and Four-Year Colleges & Universities: Visit go.jblearning.com/FindMyRep to make your request.

Canada Sales: Nelson Education Ltd. 1-800-668-0671 nelson.inquire@nelson.com

Textbook Examination Copies Complimentary* review copies are available for qualified instructors who wish to consider a text for course adoption. For fastest service, make your request online at www.jblearning.com or let our knowledgeable Account Managers help you find the text that best meets your course needs. * Jones & Bartlett Learning reserves the right to evaluate requests for complimentary review copies.

Facebook www.fb.com/JBLCyber Twitter: @JBLearning Instagram @jblearning Blog: blogs.jblearning.com/computer-science LinkedIn: www.linkedin.com/company/jones-&-bartlett-learning Email Updates: www.jblearning.com/eUpdates

31


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.