Cybersecurity in Context
Technology, Policy, and Law
1. Edition August 2024
544 Pages, Hardcover
Wiley & Sons Ltd
"A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world."
--JOSIAH DYKSTRA, Trail of Bits
"A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber."
--BRUCE SCHNEIER, author of A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
The first-ever introduction to the full range of cybersecurity challenges
Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject.
Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century's most important fields.
Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.
Golden G. Richard III is Professor of Computer Science and Director of the Cyber Center at Louisiana State University. He is a Fellow of the American Academy of Forensic Sciences with over thirty years of experience in teaching cybersecurity and related topics in computer science. His primary areas of expertise are in memory forensics, digital forensics, malware analysis, reverse engineering, and systems programming.