COMPUTER SCIENCEsalearningsolutionsph.com/wp-content/uploads/2018/09/4.pdf2018/09/04 · PP =...
Transcript of COMPUTER SCIENCEsalearningsolutionsph.com/wp-content/uploads/2018/09/4.pdf2018/09/04 · PP =...
COMPUTER SCIENCE
ACADEMIC CATALOG 2018
www.jblearning.com
Innovative
Course
Solutions
Inside!
THE JONES & BARTLETT LEARNINGDIFFERENCE
SUPERIOR CUSTOMER SERVICE
At Jones & Bartlett Learning, our commitment to creating high-quality print and online
learning solutions is revolutionizing how instructors teach and how students and
professionals learn. We develop educational programs and services that improve learning
outcomes and enhance student achievement by combining authoritative content written
by respected authors with innovative, proven, and engaging technology applications
that meet the diverse needs of today’s instructors, students, and professionals. Our
experienced Account Managers will work with you to match our titles and technology
learning solutions to your unique curriculum.
Personal, responsive service is the hallmark of Jones & Bartlett Learning. Our Account
Managers are dedicated to providing you with the best customer service.
Your questions and concerns are our priority. Let us know how we can help.
Image Credits: Cover: © Cecilie_Arcurs/GettyImages.
Source Code: CSCat2018
Facebook www.fb.com/JBLCyber
Twitter: @JBLearning
Blog: blogs.jblearning.com/computer-science
LinkedIn: www.linkedin.com/company/jones-&-bartlett-learning
Email Updates: www.jblearning.com/eUpdates
Instagram @jblearning
For more information, call 1-800-832-0034 or visit www.jblearning.com.
4 Easy Ways to Order
1. Toll Free: 1-800-832-0034
2. Fax: 978-443-8000
3. Mail: Jones & Bartlett Learning
5 Wall Street
Burlington, MA 01803
4. Web: www.jblearning.com
For additional ordering information, turn
to page 31.
Textbook Examination Copies
Complimentary review copies are
available for qualified instructors who wish
to consider a text for course adoption.
For fastest service, make your request
online at www.jblearning.com, or let our
knowledgeable Account Managers help
you find the text that best meets your
course needs.
Introductory Computer Science 6
Programming 7-8
Web Design 9-10
Mobile Programming 11-12
Data Structures 13
Computer Organization & Architecture 14-15
Theory of Computation 16
Algorithms 17
Math for Computer Science 18
Databases 19
Software Engineering 20
Computer Security & Ethics 21-29
Navigate 2 30
Contact Us 31
CONTENTS
3
ENHANCE TEACHING AND LEARNING WITH STUDENT AND INSTRUCTOR SUPPORT MATERIALSFor the Student—
To meet the needs of today’s students,
we have developed numerous interactive
and engaging learning resources. Look
for Student Resources listed under
specific titles to see the range of options
available.
Student Resources:
AR = Additional ResourcesCL = CodeLabCW = Navigate Companion WebsiteEB = eBookFL = Interactive FlashcardsIG = Interactive GlossaryLM = Lab ManualLO = Lecture OutlinesPQ = Practice QuizzesSC = Source CodeSI = SimulationsWA = WebAssign
For the Educator—
Many of our core textbooks are
accompanied by print and online
resources that support and enhance the
teaching process. Look for Instructor
Resources listed under specific titles to
see the range of options available.
Instructor Resources:
AE = Answers to ExercisesAR = Additional ResourcesCL = CodeLabEB = eBookIB = Image BankIM = Instructor’s ManualLM = Lab ManualLO = Lecture OutlinePP = Slides in PowerPoint FormatPS = Project SolutionsSC = Source CodeSL = Sample SyllabusSM = Solutions ManualTB = TestbankTG = Transition GuideWA = WebAssign
“I am very pleased with every aspect of this project. Setting up our instance of Blackboard Learn to receive content was a breeze; the directions were very clear and easy to follow. After the content was uploaded into our site, every bit of it fell perfectly into place. Dan, our client solutions manager was very responsive and incredibly helpful. I did not feel like I was working with a large corporate entity or some support desk in an undisclosed location. I feel like we have a Jones & Bartlett Learning office just up the hall. This level of support is the gold standard in our industry and we appreciate that kind of service.”
George Finkle, Senior Instructional Applications Administrator, Henderson State University
We’ve been collaborating with faculty just like you to enhance the teaching and learning experience. Here are just a few of the solutions and services we offer.
New test bank development
Sample syllabus and course outline creation
Full program mapping (with customer selected texts)
Custom PowerPoint slides and interactive lectures
Full, or augmented course development
Instructional designer consultation and course assessment
CUSTOM DEVELOPMENT
PUBLISH: CUSTOM TEXTBOOKS
COURSE CONTENT MAPPING
LMS COURSE DELIVERY
LABS, HOMEWORK & COURSE SOLUTIONS
ADAPTIVE LEARNING & ANALYTICS
TESTPREP
TRAINING & SUPPORT
To learn more visit www.jblearning.com/custom or complete the request form at customsolutions.jblearning.com/contact.html to be contacted by a client solutions manager today.
*Single sign-on access is not yet available. People © Rawpixel.com/Shutterstock.
To Learn More, Contact Your Account Manager or Visit turingscraft.com
CodeLab is the leading web-based interactive programming exercise system for introductory programming courses in Python, Java, C++, C, JavaScript, C#, Visual Basics, and SQL. CodeLab is a seasoned system that has been used in over 350 institutions in 20 countries and analyzes over 60 million exercise submissions from more than 150,000 students.
Each CodeLab has between 350 and 800 short exercises, each focused on a particular programming idea or language construct. The student types in code and the system immediately judges its correctness, offering hints when the submission is incorrect. Through this process, the student gains mastery over the semantics, syntax, and common usage of the language elements.
ISSAA Leader in Cybersecurity & Cyberdefense Education
See What’s NEW with the VirtualSecurity Cloud Labs!Jones & Bartlett Learning offers students a fully
immersive mock IT infrastructure where students can
test their skills with realistic security scenarios in a safe
learning environment.
See page 26 for more details
INTRODUCTORY COMPUTER SCIENCE
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com
Computer Science IlluminatedSIXTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Nell Dale, The University of Texas, AustinJohn Lewis, Virginia Tech
The sixth edition of the best-selling Computer Science Illuminated retains the accessibility and in-depth coverage of previous editions, while incorporating all-new material on cutting edge issues in computer science. Authored by the award-winning Nell Dale and John Lewis, the Sixth Edition’s unique and innovative layered approach moves through the levels of computing from an organized language-neutral perspectives.
KEY FEATURES
• Includes Navigate 2 Advantage Access with complete eBook, animations, lab manual, assessments, programming language chapters, and more
• Completely revised section on HTML and CSS• Updates regarding top-level domains, social
networks, and Google Analytics• All new section on Internet management,
including ICANN control and net neutrality• New and updated Did You Know callouts are
included in the chapter margins• New and revised Ethical Issues and Biographies
throughout emphasize the history and breadth of computing
• Available in our customizable PUBLISH platform
BEST-
SELLING!
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-05591-7 • 700 pages • © 2016
Student Resources: AE, EB, IB, LO, PP, TB Instructor Resources: AR, EB, FL, IG, LM, PQ, SI
http://go.jblearning.com/CSI6e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-06950-1 • © 2016
6
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
PROGRAMMING
Java IlluminatedAn Active Leaning ApproachFIFTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Julie Anderson, Rollins CollegeHervé J. Franceschi, Loyola University Maryland
Written for the one- to three-term introductory programming course, the fifth edition of Java Illuminated: An Active Learning Approach provides learners with an interactive, user-friendly style to learning the Java programming language. Comprehensive yet accessible, the text takes a progressive approach to object-oriented programming, allowing students to build on established skills in order to develop new and increasingly complex classes.
An activity-based pedagogy with programming activities, group projects, interactive examples and exercises, and CodeLab access keeps students engaged and motivated throughout the course.
KEY FEATURES
• Updated to include Java 8 and 9 throughout the text
• JavaFX has replaced Swing in Chapter 4 (Introduction to Graphical Applications), Chapter 12 (Graphical User Interfaces Using Java FX), and in all graphics applications and programming activities throughout the text
• A revised Chapter 2 (Programming Building Blocks – Java Basics) now uses jshell sandbox for immediate code feedback
NEW 5TH
EDITION!
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-14099-6 • 1,200 pages • © 2019
Instructor Resources: AE, EB, CL, LO, PP, SC, SM, TB, TG
StudentResources: EB, CL, FL, IG, PQ, SC, SI
http://go.jblearning.com/Java5e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-14110-8 • © 2019
7
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, animations, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
• Every new print copy includes access to Turing’s Craft CodeLab
PROGRAMMING
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com8
Includes
CodeLab!Includes
CodeLab!
Programming and Problem Solving with C++COMPREHENSIVE SIXTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Nell Dale, The University of Texas, AustinChip Weems, University of Massachusetts, Amherst
This best-selling text, now in its sixth edition, remains the single clearest and most comprehensive introduction to C++, object-oriented programming, and software development available. Renowned author team Nell Dale and Chip Weems present a studentcentered, pragmatic, and hands-on approach.
KEY FEATURES
• Features strong pedagogical elements, including real-world case studies and highly relevant exercises that reinforce key concepts
• Contains new programming exercises throughout, and a new, more student-friendly organization of material
• Introduces C++ language constructs in parallel with the appropriate theory so students can see and understand its practical application
Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-07919-7 • 1,068 pages • © 2014
Instructor Resources: AE, CL, EB, LM, LO, PP, SC, TB Student Resources: EB, CL, IG, LM, PQ, SC
http://go.jblearning.com/PPSEnhanced
Python Programming in ContextSECOND EDITION
Bradley N. MillerDavid L. RanumBoth of Luther College
Python Programming in Context provides a comprehensive, accessible introduction to Python fundamentals. Building on essential concepts of computer science and offering a plentitude of real-world examples, this text offers a thorough overview of multiple applied areas, including image processing, cryptography, astronomy, the Internet, and bioinformatics.
KEY FEATURES
• Utilizes Python 3 throughout• Provides a clear, accessible, and skill-focused
approach to programming with Python• Awarded a “Textbook
Excellence Award” (Texty) from the Text and Academic Authors Associate (TAA)
ISBN: 978-1-4496-9939-0 Paperback with Access Code 498 pages • © 2014
Instructor Resources: AE, CL, PP, SC, TB Student Resources: CL, SC
http://go.jblearning.com/Python2e
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
WEB DESIGN
Web Programming with HTML5, CSS, and JavaScriptINCLUDES NAVIGATE 2 ADVANTAGE ACCESS
John Dean, Park University
Web Programming with HTML5, CSS, and JavaScript is written for the undergraduate, web programming course and is appropriate for students with or without programming experience. It covers the three client-side technologies (HTML5, CSS, and JavaScript) in depth, with no dependence on server-side technologies. One of the distinguishing features of this new text is its coverage of Canvas, one of the most important new features of HTML5.
Throughout the text, topics are presented in a logical, comprehensive manner and code is presented in both short code fragments and complete web pages, allowing readers to grasp concepts quickly and then apply the concepts in the context of a complete web page. The chapters include optional case-study sections, which present the incremental development of a sophisticated website. The case studies allow students to apply what they have learned, providing them with a sense of the real-world design process.
KEY FEATURES
• Written in a fun, conversational tone to engage readers in the learning process
• Presents content in a way that helps develop creativity and problem-solving skills
• Incorporates interesting case studies at the close of each chapter that discuss the creation of an increasingly sophisticated website
NEW
Option 1:Paperback with Navigate 2 Advantage Access ISBN 978-1-284-09179-3 • 678 pages • © 2019
Instructor Resources: SC, PP, ES, PS, TB, AR, EB, LO, SM
Student Resources: SC, PQ, LO, EB
http://go.jblearning.com/webprogramming
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-09215-8 • © 2019
9
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, additional projects, a full suite of instructor resources, and learning analytics reporting tools.
• Strikes an appropriate balance between short code fragments and complete web pages so readers are able to grasp new concepts quickly and apply those concepts in the context of complete web pages
• Includes three types of homework problems at the end of each chapter—review questions, exercises and projects
• Instructor resources include Slides in PowerPoint format, Exercise and Project solutions, Test Bank, and Additional Projects
WEB DESIGN
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com
Web Programming and Internet TechnologiesAn E-Commerce ApproachSECOND EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Porter Scobey, PhDPawan Lingras, PhDBoth of Saint Mary’s University, Halifax
Revised and updated with the latest data from the field, Web Programming and Internet Technologies: An E-Commerce Approach, Second Edition continues to feature a handson and active learning approach. Written for the one-term web programming course for first or second year students, the Second Edition introduces students to the fundamental techniques of web programming through the continual development of a real-world business example. Students learn the basics of HTML5, CSS3, JavaScript, PHP, and MySQL and apply their knowledge to construct their own fully functional e-commerce site.
KEY FEATURES
• NEW – Updated throughout to include HTML5, CSS3, JavaScript, and PHP
• NEW – Includes an introduction to responsive web design
• NEW – Includes an introduction to AJAX• USER FAVORITE – Presents a real world case
study in each chapter using the example of Nature’s Source, a business that sells health products online
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-07068-2 • 580 pages • © 2018
Instructor Resources: AE, IB, IM, PP, SC, TB, TG Student Resources: AR, EB, LO, PQ, SC
http://go.jblearning.com/Scobey2e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-07074-3 • © 2018
10
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
• USER FAVORITE – Each chapter concludes with updated resources to test student comprehension, including Quick Questions to Test Your Basic Knowledge, Short Exercises to Improve Your Basic Understanding, Exercises on the Parallel Project, and What Else You May Want or Need to Know
• UPDATED – Instructor Resources including slides in PowerPoint format, answers to the endof- chapter questions, and an expanded Test Bank
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
MOBILE PROGRAMMING
Android App DevelopmentINCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Hervé J. Franceschi, Loyola University Maryland
Using innovative, engaging methods, Android App Development cultivates student knowledge of app development through a progressive, building block approach. Each chapter includes a classroom-friendly, meaningful app that illustrates the concepts covered at the chapter level. Model View Controller architecture is used throughout the book to promote good software engineering practice. Students will be engaged by essential as well as specialized topics such as XML resources, event-driven programming, animation, sounds, making a game, voice recognition, and more.
KEY FEATURES
• Android Studio, the official development environment by Google, is used to develop all applications
• The Model View Controller architecture is used throughout the book, allowing the instructor to download the Model and concentrate on the View and Controller elements of the app
• Students learn how to make deviceindependent apps using a progressive approach, incorporating fun topics such as animation, sounds, photo editing, using the GPS, displaying a map, and advertising
• Software Engineering and Common Error boxes highlight software engineering tips and common errors throughout each chapter
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-09212-7 • 682 pages • © 2018
Instructor Resources: AE, IM, PP, SC, TB Student Resources: AR, EB, LO, PQ, SC
http://go.jblearning.com/Franceschi
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-09318-6 • © 2018
11
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
• Chapters are written independently of others so that instructors can select topics and customize the book to their course
• Each chapter concludes with exercises for student practice, including Multiple Choice, Fill In the Code, and Write an App exercises
MOBILE PROGRAMMING
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com
Android Programming ConceptsINCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Trish CornezRichard CornezBoth of University of Redlands
Using a hands-on, student-friendly approach, Android Programming Concepts provides a comprehensive foundation for the development of mobile applications for devices and tablets powered by Android. This text offers in-depth coverage of the topics outlined by the official Android developer API guides, leading a programmer with object-oriented programming skills through the app development process. Each chapter features a collection of well-designed and classroom-tested lab examples, providing an opportunity to apply specific Android concepts while supported by visual guides, explanations, and code listings.
KEY FEATURES
• Android Studio, the official development environment by Google, is used to develop all applications
• Includes 44 practical and interesting lab examples linked to real-world mobile problems, including constructing games with moving graphics
• Mobile programming commences in Chapter 1 with the development of two native Android applications, beginning with a problem statement and storyboard and ending with an executable app
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-07070-5 • 834 pages • © 2017
Instructor Resources: AE, EB, IB, LO, PP, SC, TB Student Resources: EB, LO, PP, PQ, SC
http://go.jblearning.com/Android
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-07075-0 • © 2017
12
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
• Each chapter concludes with skill-oriented questions designed to test comprehension of key concepts
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
DATA STRUCTURES
13
C++ Plus Data StructuresSIXTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Nell Dale, PhD, University of Texas, AustinChip Weems, University of Massachusetts, AmherstTim Richards, University of Massachusetts, Amherst
C++ Plus Data Structures, Sixth Edition explores the specifications, applications, and implementations of abstract data types with unmatched accessibility. Topics such as modularization, data encapsulation, information hiding, and much more are carefully presented to foster solid software engineering technique
NEW & KEY FEATURES OF THE SIXTH EDITION
• UPDATED – Updated with new C++11 features including range-based for loops and threads
• NEW – Includes a new Chapter 10, Trees Plus, that emphasizes balancing of search trees by covering AVL Trees, Red-Black Trees, and B-Trees
• NEW – Includes a new chapter on Sets, Maps, and Hashing
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-08918-9 • 838 pages • © 2018
Instructor Resources: AE, IM, PP, SC, TB, TG Student Resources: AR, EB, FL, LO, PQ, SC
http://go.jblearning.com/cplusds6e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-08921-9 • © 2018
Object-Oriented Data Structures Using JavaFOURTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Nell Dale, PhD, University of Texas, AustinDaniel T. Joyce, Villanova UniversityChip Weems, University of Massachusetts, Amherst
Object-Oriented Data Structures Using Java, Fourth Edition is an essential resource for students learning data structures using the Java programming language. It presents both the traditional and modern data structure topics with an emphasis on problemsolving and object-oriented software design.
KEY FEATURES
• NEW - Includes chapters on the Map ADT and the Collection ADT
• NEW - Sections highlighting variations on the standard data structures, including a look at how the structures are supported by the Java Standard Library
• NEW - New sections and examples introduce important topics such as image generation, recursive processing of arrays and linked lists, fractals, games, and text analysis
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-08909-7 • 694 pages • © 2018
Instructor Resources: AE, PP, SC, TB, TG Student Resources: EB, FL, LO, PQ, SC
http://go.jblearning.com/oods4e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-08920-2 • © 2018
The Essentials of Computer Organization and ArchitectureFIFTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Linda Null, Pennsylvania State UniversityJulia Lobur, Pennsylvania State University
Bestselling text, The Essentials of Computer Organization and Architecture, Fifth Edition, is comprehensive enough to address all necessary organization and architecture topics, but concise enough to be appropriate for a single-term course. Its focus on real-world examples and practical applications encourages students to develop a “big-picture” understanding of how essential organization and architecture concepts are applied in the computing world. In addition to direct correlation with the ACM/IEEE guidelines for computer organization and architecture, the text exposes readers to the inner workings of a modern digital computer through an integrated presentation of fundamental concepts and principles.
KEY FEATURES
• NEW - Null Pointers side bars include helpful hints to simplify concepts students typically struggle with
• Streamlined presentation of content with material not deemed “essential” available online
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-12303-6 • 880 pages • © 2019
Instructor Resources: IM, PP, TB, EB Student Resources: EB, FL, LO, PQ, AR
http://go.jblearning.com/Null5e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-12305-0 • © 2019
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
COMPUTER ORGANIZATION & ARCHITECTURE
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com14
• Discussion of hardware updated and expanded throughout
• The MARIE Simulator package allows students to learn the essential concepts of computer organization and architecture, including assembly language, without getting caught up in unnecessary and confusing details
NEW 5TH
EDITION!
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
COMPUTER ORGANIZATION & ARCHITECTURE
15
ISBN: 978-1-284-07963-0 • Hardcover • 824 pages • © 2017 Instructor Resources: AR, PP, SM
http://go.jblearning.com/Warford5e
Computer SystemsFIFTH EDITION
J. Stanley Warford, Pepperdine University
Updated throughout with the latest updates as well as the new Pep/9 virtual machine, Computer Systems, Fifth Edition provides a clear, detailed, step-by-step introduction to the central concepts in computer organization, assembly language, and computer architecture. It urges students to explore the many dimensions of computer systems through a top-down approach to levels of abstraction. By examining how the different levels of abstraction relate to one another, the text helps students look at computer systems and their components as a unified concept.
KEY FEATURES
• New high-order language—The high-order language is changed from C++ to C, the language more commonly used in computer systems
• New sidebars—Each sidebar is a real-world example of the concepts described in that chapter. As most of the chapters describe the Pep/9 virtual machine, the sidebars for those chapters show corresponding implementations for the Intel x86 architecture
• New and expanded topics—New and expanded topics include, QR codes, color displays, Unicode, UTF-32 and UTF-8 encoding, floating point underflow, big-endian and little-endian order, memory alignment issues, and expanded RISC design principles and MIPS coverage to contrast with the Pep/9 CISC design
• New virtual machine—Pep/8, the virtual machine for the two previous editions, is now superseded by the new and improved Pep/9
TABLE OF CONTENTS
Level 7 ApplicationChapter 1 Computer Systems
Level 6 High-Order LanguageChapter 2 CLevel 3 Instruction Set Architecture
Chapter 3 Information RepresentationChapter 4 Computer Architecture
Level 5 AssemblyChapter 5 Assembly LanguageChapter 6 Compiling to the Assembly LevelChapter 7 Language Translation Principles
Level 4 Operating SystemChapter 8 Process ManagementChapter 9 Storage Management
Level 1 Logic GateChapter 10 Combinational CircuitsChapter 11 Sequential Circuits
Level 2 MicrocodeChapter 12 Computer Organization
AppendixSolutions to Selected ExercisesIndex
An Introduction to Formal Languages and AutomataSIXTH EDITION
Peter Linz, University of California, Davis
An Introduction to Formal Languages and Automata, Sixth Edition provides an accessible, student-friendly presentation of all material essential to an introductory Theory of Computation course. Written to address the fundamentals of formal languages, automata, and computability, the text is designed to familiarize students with the foundations and principles of computer science and to strengthen the students’ ability to carry out formal and rigorous mathematical arguments. The author, Peter Linz, continues to offer a straightforward, uncomplicated treatment of formal languages and automata and avoids excessive mathematical detail allowing students to focus on and understand the key underlying principles.
KEY FEATURES
• An accessible approach allows students to clearly understand key content while retaining the appropriate mathematical notations and theorems required for the course
• New Chapter Synopsis, found at the beginning of each chapter, recaps important concepts found in the text
• Every major idea is preceded by a motivating example, drawn from applications, that introduces the concept and illustrates its usefulness
• New Exercises added throughout, with accessible exercises more closely tied to examples in the text
• An enhanced Instructor’s Manual includes more detailed solutions to all problems found in the text
• Bundle with JFLAP, An Interactive Formal Languages and Automata Package (ISBN: 978-0-7637-3834-1)
CONTENTS
Chapter 1 Introduction to the Theory of Computation
Chapter 2 Finite AutomataChapter 3 Regular Languages and Regular
GrammarsChapter 4 Properties of Regular LanguagesChapter 5 Context-Free LanguagesChapter 6 Simplification of Context-Free
Grammars and Normal FormsChapter 7 Pushdown AutomataChapter 8 Properties of Context-Free LanguagesChapter 9 Turing MachinesChapter 10 Other Models of Turing MachinesChapter 11 A Hierarchy of Formal Languages
and AutomataChapter 12 Limits of Algorithmic ComputationChapter 13 Other Models of ComputationChapter 14 An Overview of ComputationalComplexity
ISBN: 978-1-284-07724-7 • Hardcover • 450 pages • © 2017 Instructor Resources: IB, IM, PP
http://go.jblearning.com/Linz6e
THEORY OF COMPUTATION
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com16
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
ALGORITHMS
17
ISBN: 978-1-284-04919-0 • Paperback • 676 pages • © 2015 Instructor Resources: IB, IM, SM, PP
http://go.jblearning.com/Algorithms
Foundations of AlgorithmsFIFTH EDITION
Richard E. Neapolitan, Northwestern University
Foundations of Algorithms, Fifth Edition offers a well-balanced presentation of algorithm design, complexity analysis of algorithms, and computational complexity. Ideal for any computer science student with a background in college algebra and discrete structures, the text presents mathematical concepts using standard English and simple notation to maximize accessibility and user-friendliness.
The revised and updated Fifth Edition features an all-new chapter on genetic algorithms and genetic programming, including approximate solutions to the traveling salesperson problem, an algorithm for an artificial ant that navigates along a trail of food, and an application to financial trading. With fully updated exercises and examples throughout and improved instructor resources including complete solutions, an Instructor’s Manual and Lecture Slides, Foundations of Algorithms is an essential text for undergraduate and graduate courses in the design and analysis of algorithms.
KEY FEATURES
• The only text of its kind with a chapter on genetic algorithms and genetic programming
• Use of C++ and Java pseudocode help students better understand complex algorithms
• No calculus background required• Numerous clear and student-friendly
examples throughout• Fully updated exercises and examples
throughout• Improved instructor resources including
revised problem solutions, test questions, and lecture outlines in PowerPoint format
CONTENTS
Chapter 1 Algorithms: Efficiency, Analysis, and Order
Chapter 2 Divide-and-ConquerChapter 3 Dynamic ProgrammingChapter 4 The Greedy ApproachChapter 5 BacktrackingChapter 6 Branch-and-BoundChapter 7 Introduction to Computational
Complexity: The Sorting ProblemChapter 8 More Computational Complexity: The
Searching ProblemChapter 9 Computational Complexity and
Intractability: An Introduction to the Theory of NP
Chapter 10 Genetic AlgorithmsChapter 11 Number-Theoretic AlgorithmsChapter 12 Introduction to Parallel Algorithms
Essentials of Discrete MathematicsTHIRD EDITION
David J. Hunter, Westmont College
Written for the one-term course, Essentials of Discrete Mathematics, Third Edition is designed to serve computer science and mathematics majors, as well as students from a wide range of other disciplines. The mathematical material is organized around five types of thinking: logical, relational, recursive, quantitative, and analytical. This presentation results in a coherent outline that steadily builds upon mathematical sophistication. Graphs are introduced early and referred to throughout the text, providing a richer context for examples and applications. Algorithms are presented near the end of the text, after students have acquired the skills and experience needed to analyze them. The final chapter emphasizes the multidisciplinary approach and contains case studies that integrate the fields of biology, sociology, linguistics, economics, and music.
KEY FEATURES
• Student Inquiry Problems, found at the beginning of each section, are designed to introduce and motivate the material in the section that follows
• Incorporates new content on Graph Theory• Updated and expanded WebAssign Online
Homework and Grading System available for students and instructors. Includes 349 New Exercises!
ISBN: 978-1-284-05624-2 Hardcover • 492 pages • © 2017
Instructor Resources: AR, IM, PP, SM, WA Student Resources: WA
http://go.jblearning.com/Hunter3e
Discrete Structures, Logic, and ComputabilityFOURTH EDITION
James L. Hein, Professor Emeritus, Portland State University
Updated to align to the latest 2013 ACM/IEEE Computer Science curricula, Discrete Structures, Logic, and Computability, Fourth Edition is designed for the one- to two-term Discrete Mathematics course. The structure of the book supports the spiral method of learning, by first introducing basic information, allowing students to work on the problem, and then revisiting the topic as new information and skills are established. This method, coupled with a studentfriendly and simplified writing style, provides an accessible yet comprehensive level of coverage.
KEY FEATURES
• Written for prospective computer scientists, computer engineers, or applied mathematicians, who wish to learn about the ideas that underlie computer science
• Over 300 new exercises and 125 new examples have been added throughout the text
• Includes a new Chapter 10, Graph Theory, expanding the introductory material presented in Chapter 1
• Includes access to the Navigate Student Companion Website, featuring a Student Study Guide and a Lab Book of experiments that use a free open-source mathematics software system
ISBN: 978-1-284-07040-8 Hardcover with Access Code • 1,040 pages • © 2017
Instructor Resources: PP, SM, TB Student Resources: CW
http://go.jblearning.com/Hein4e
MATH FOR COMPUTER SCIENCE
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com18
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
DATABASES
19
Databases IlluminatedTHIRD EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Catherine M. Ricardo, Iona CollegeSusan D. Urban, Professor Emeritus, Arizona State University
Databases Illuminated, Third Edition combines database theory with a practical approach to database design and implementation. Strong pedagogical features, including accessible language, real-world examples, downloadable code, and engaging hands-on projects and lab exercises create a text with a unique combination of theory and student-oriented activities. Providing an integrated, modern approach to databases, Databases Illuminated, Third Edition is the essential text for students in this expanding field.
KEY FEATURES
• Includes a new chapter on the emerging topics of Big Data, NoSQL, and NewSQL
• Incorporates revised and expanded coverage on database security, including SQL injection
• Includes extended coverage of SQL, with additional material on temporal database queries and JDBC
• Provides updated information on social and ethical issues addressing new regulations and global concerns
• Uses the open source software LibreOffice, which is available worldwide
Option 1:Hardcover with Navigate 2 Advantage Access ISBN: 978-1-284-05694-5 • 718 pages • © 2017
Instructor Resources: AR, EL, IB, IM, LO, PP, SM, SC, TB
Student Resources: AR, EB, FL, IG, LM, LO, PQ, SC
http://go.jblearning.com/Ricardo3e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-07709-4 • © 2017
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Essentials of Software EngineeringFOURTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Frank Tsui, PhD, Kennesaw State UniversityOrlando Karam, Kennesaw State UniversityBarbara Bernal, Kennesaw State University
Written for the undergraduate, one-term course, Essentials of Software Engineering, Fourth Edition provides students with a systematic engineering approach to software engineering principles and methodologies. Comprehensive, yet concise, the Fourth Edition includes new information on areas of high interest to computer scientists, including Big Data and developing in the cloud.
In-depth coverage of key issues, combined with a strong focus on software quality, makes Essentials of Software Engineering, Fourth Edition the perfect text for students entering the fast-growing and lucrative field of software development. The text includes thorough overviews of programming concepts, system analysis and design, principles of software engineering, development and support processes, methodologies, software testing and quality, and product management, while incorporating real-world examples throughout.
KEY FEATURES
• New content on designing for Big Data in Chapter 7
• New content on developing for the Cloud in Chapter 9
• Updates on the changes in Agile Development Processes such as Kanban
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-10600-8 • 334 pages • © 2018
Instructor Resources: AE, PP, SC, SL, TB, TG Student Resources: AR, EB, FL, LO, PQ, SC
http://go.jblearning.com/Tsui4e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-10634-3 • © 2018
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
SOFTWARE ENGINEERING
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com20
• Updates on Data Technology such as Hadoop• New short discussion on REST architecture
for distributed system design• Online Projects now available with Navigate 2
Advantage Access
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
COMPUTER SECURITY & ETHICS
21
CyberethicsMorality and Law in CyberspaceSIXTH EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Richard A. Spinello, Boston College
Written for the undergraduate course, Cyberethics: Morality and Law in Cyberspace, Sixth Edition provides a modern, comprehensive examination of the social costs and moral issues emerging from the ever-expanding use of the Internet and new information technologies, as well as Internet governance and its control by the state. It highlights both the legal and philosophical perspective of content control, free speech, intellectual property, and security. The Sixth Edition includes interesting new case studies on social media, privacy, and the right to be forgotten, which encourages discussion and fosters critical thinking.
KEY FEATURES
• Includes new case studies on modern issues such as the Privacy and the Right to be Forgotten, Employers Monitor Social Media and Twitter, and Free Speech and Terrorism
• Provides in-depth discussion of net neutrality and Internet governance
• Considers the escalating encryption controversy involving the smartphone
• Provides a comprehensive look at the privacy and free speech issues arising from the expanded use of social networking
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-08139-8 • 244 pages • © 2017
Instructor Resources: EB, IM, LO, PP, TB, SL Student Resources: EB, FL, IG, LO, PQ
http://go.jblearning.com/Spinello6e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-08145-9 • © 2017
Navigate 2 Advantage AccessEach new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
COMPUTER SECURITY & ETHICS
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com
Elementary Information SecuritySECOND EDITION
INCLUDES NAVIGATE 2 ADVANTAGE ACCESS
Richard E. Smith
An ideal text for introductory information security course, the second edition of Elementary Information Security provides a comprehensive, yet easy-to-understand introduction to the complex world of cybersecurity and technology. This essential text enables students to gain direct experience by analyzing security problems and practicing simulated security activities. Emphasizing learning through experience, Elementary Information Security, Second Edition addresses technologies and cryptographic topics progressing from individual computers to more complex Internet-based systems.
KEY FEATURES
• Uses the nationally recognized NIST Risk Management Framework to illustrate the cybersecurity process
• Comprehensive coverage and full compliance of all topics required for U.S. government courseware certification NSTISSI 4011
Option 1:Paperback with Navigate 2 Advantage Access ISBN: 978-1-284-05593-1 • 866 pages • © 2016
Instructor Resources: AR, EB, LO, IB, IM, PP, SL, TB Student Resources: EB, FL, IG, LM, LO, PQ
http://go.jblearning.com/Smith2e
Option 2: 50% Off Option 1!Navigate 2 Advantage Access Only ISBN: 978-1-284-07126-9 • © 2016
22
Navigate 2 AccessNavigate 2 Advantage Access is included with every new print copy of Elementary Information Security, and includes a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Please contact your Account Manager for information on how your students can access virtual security cloud labs to accompany this text.
BEST-
SELLING!
Sign Up to Receive Updates and Special Offers: www.jblearning.com/eUpdates
COMPUTER SECURITY & ETHICS
23
Fundamentals of Information Systems SecurityTHIRD EDITION
David Kim, President and Chief Security Officer, Security Evolutions, Inc., Fairfax, VirginiaMichael G. Solomon, PhD, CISSP, PMP, CISM, Solomon Consulting Inc.
Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book closes with information on information security standards, education, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.
KEY FEATURES
• Maps fully to the six major domains of the CompTIA Security+ SYO-401 Certification exam
• Updated to include coverage on recent compliance law and standards updates, including FISMA, NIST SP800-171, and PCI DSS v3.2
• New content on advanced malware and APT attacks to the end points such as ransomware and crypto locker
ISBN: 978-1-284-11645-8 • Paperback • 548 pages • © 2018 Instructor Resources: AE, AR, IB, IM, LM, PP, SL, TB, TG Student Resources: LM
http://go.jblearning.com/Kim3e
• Addresses data breach and data breach incident response planning
• Introduces recent “Internet of Things” risk threats and privacy issues
• Available with the Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
BEST-
SELLING!
Part of the Information Systems Security and Assurance Curriculum Series
System Forensics, Investigation and ResponseTHIRD EDITION
Chuck Easttom
Revised and updated to address current issues and technology, System Forensics, Investigation, and Response, Third Edition provides a solid, broad grounding in digital forensics. The text begins by examining the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Part II addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, Part III explores emerging technologies as well as future directions of this interesting and cutting-edge field.
KEY FEATURES
• Covers all aspects of forensics: procedures, legal issues, and scientific principles as well as specific hands on forensics with Windows, smart phones, memory, network forensics, and Macintosh forensics
• New and expanded content on mobile device forensics, addressing the most current issues
• Additional information on memory forensics• Updated and expanded coverage on legal
issues• Significantly expanded material on Windows
forensics
NEW
ISBN: 978-1-284-12184-1 • Paperback • 336 pages • © 2019 Instructor Resources: AE, AR, IB, IM, LM, PP, SL, TB, TG Student Resources: LM
http://go.jblearning.com/Easttom3e
COMPUTER SECURITY & ETHICS
5 Wall Street | Burlington, MA | 01803 | 978-443-5000 | www.jblearning.com24
• Includes information on how to write reports• Available with the Virtual Security Cloud
Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
For a more information on all titles in the Information Systems Security & Assurance Series visit
www.issaseries.com
COMPUTER SECURITY & ETHICS
25
Hacker Techniques, Tools & Incident HandlingTHIRD EDITION
Sean-Philip Oriyano
Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
KEY FEATURES
• Includes the latest content and tactics related to hacking and its methodology
• Provides updated and expanded content on important techniques
• Incorporates the most current hardware, software, and protocols
• Coverage of the Internet of Things and how it has expanded attack surfaces
NEW
ISBN: 978-1-284-14780-3 • 450 pages • © 2020 Instructor Resources: AE, AR, IB, IM, LM, PP, SL, TB Student Resources: LM
http://go.jblearning.com/Oriyano3e
• Additional coverage of what to do if you are attacked
• Available with Virtual Security Cloud Labs which provide a hands-on, immersive mock IT infrastructure enabling students to test their skills with realistic security scenarios
Available August 2018
26
ISSAINFORMATION SYSTEMS SECURITY & ASSURANCE SERIES
The Jones & Bartlett Learning Information Systems Security & Assurance Series delivers fundamental
IT security principles packed with real-world applications and examples for IT Security, Cybersecurity,
Information Assurance, and Information Systems Security Programs. This innovative curriculum offers
relevant, forward-thinking resources, and hands-on labs to enable your students to investigate and solve
the cybersecurity challenges of today and tomorrow.
• 15 textbooks/eBooks each with content divided into 15 chapters
• 15 courses, developed for onsite and online use, with full instructor material. Each course includes
scenario-based problems where students role-play an IT security practitioner as well as homework
assignments, quizzes, exams, and detailed instructor guides and lab manuals
• 80 hands-on labs provide a unique, experiential learning environment
• NEW Content – All 80 Virtual Security Cloud Labs
have been expanded to include a new Applied
Learning section and updated Lab Challenge and
Analysis section to supplement the existing Hands-On Demonstration
• NEW Lab Environment – New features and functionalities available for 3.0, including Progress Tracking,
Collapsible Lab Frame, and System Checker
• NEW Saved States Feature – No more worrying about completing each lab in one sitting! Students
now have the opportunity to save their work before exiting a virtual lab, then return to it later
• Updated Software – The 3.0 environment includes updates to the latest Operating Systems and
Software, including Windows Server 2016, Nessus Vulnerability Scanner, P2 Commander, Wireshark, and
more
Features of the Series
And now they’re even better!
Applied Labs to Accompany Fundamentals of Information Systems SecurityLab 1: Performing Reconnaissance and Probing using Common ToolsLab 2: Performing a Vulnerability AssessmentLab 3: Enabling Windows Active Directory and User Access ControlsLab 4: Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change ControlLab 5: Performing Packet Capture and Traffic AnalysisLab 6: Implementing a Business Continuity PlanLab 7: Using Encryption to Enhance Confidentiality and IntegrityLab 8: Performing a Web Site and Database Attack by Exploiting Identified VulnerabilitiesLab 9: Eliminating Threats with a Layered Security ApproachLab 10: Implementing an Information Systems Security Policyoach
Applied Labs to Accompany Network Security, Firewalls, and VPNsLab 1: Analyzing Protocols with WiresharkLab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless TrafficLab 3: Configuring a pfSense Firewall on the ClientLab 4: Configuring a pfSense Firewall on the ServerLab 5: Penetration Testing a pfSense FirewallLab 6: Using Social Engineering Techniques to Plan an AttackLab 7: Configuring a Virtual Private Network ServerLab 8: Configuring a VPN Client for Secure File TransferLab 9: Attacking a Virtual Private NetworkLab 10: Investigating and Responding to Network Security Incidents
27
Applied Labs to Accompany Hacker Techniques, Tools, and Incident HandlingLab 1: Assessing and Securing Systems on a Wide Area Network (WAN)Lab 2: Applying Encryption and Hashing Algorithms for Secure CommunicationsLab 3: Data Gathering and Footprinting on a Targeted WebsiteLab 4: Using Ethical Hacking Techniques to Exploit a Vulnerable WorkstationLab 5: Attacking a Vulnerable Web Application and DatabaseLab 6: Identifying and Removing Malware on a Windows SystemLab 7: Analyzing Network Traffic to Create a Baseline DefinitionLab 8: Auditing a Wireless Network and Planning for a Secure WLAN ImplementationLab 9: Investigating and Responding to Security IncidentsLab 10: Securing the Network with an Intrusion Detection System (IDS)
Applied Labs to Accompany System Forensics, Investigation, and ResponseLab 1: Applying the Daubert Standard to Forensic EvidenceLab 2: Documenting a Workstation Configuration using Common Forensic ToolsLab 3: Uncovering New Digital Evidence Using Bootable Forensic UtilitiesLab 4: Creating a Forensic System Case File for Analyzing Forensic EvidenceLab 5: Analyzing Images to Identify Suspicious or Modified FilesLab 6: Recognizing the Use of Steganography in Image FilesLab 7: Automating E-mail Evidence Discovery Using P2 CommanderLab 8: Decoding an FTP Protocol Session for Forensic EvidenceLab 9: Identifying and Documenting Evidence from a Forensic InvestigationLab 10: Conducting an Incident Response Investigation for a Suspicious Login
Applied Labs to Accompany Access Control, Authentication, and Public Key InfrastructureLab 1: Configuring an Active Directory Domain ControllerLab 2: Managing Windows Accounts and Organizational UnitsLab 3: Configuring Windows File System PermissionsLab 4: Managing Group Policy Objects in Active DirectoryLab 5: Configuring Windows FirewallLab 6: Managing Linux AccountsLab 7: Configuring Linux File System PermissionsLab 8: Encrypting and Decrypting Files with PKILab 9: Authenticating Security Communications with Digital SignaturesLab 10: Encrypting and Decrypting Web Traffic with HTTPS
Applied Labs to Accompany Internet Security: How to Defend Against Attackers on the WebLab 1: Evaluating Web Server VulnerabilitiesLab 2: Obtaining Personally Identifiable Information through Internet ResearchLab 3: Performing a Post-Mortem Review of a Data Breach IncidentLab 4: Exploiting Known Web Vulnerabilities on a Live Web ServerLab 5: Applying OWASP to a Web Security AssessmentLab 6: Applying Regulatory Compliance StandardsLab 7: Performing Dynamic and Static Quality Control TestingLab 8: Performing an IT and Web Application Security AssessmentLab 9: Recognizing Risks and Threats Associated with Emerging TechnologiesLab 10: Implementing a Security Development Lifecycle (SDL) Plan
Applied Labs to Accompany Security Strategies in Windows Platforms and ApplicationsLab 1: Implementing Access Controls with Windows Active DirectoryLab 2: Using Access Control Lists to Modify File System Permissions on Windows SystemsLab 3: Configuring Bitlocker and Windows EncryptionLab 4: Identifying and Removing Malware from Windows SystemsLab 5: Managing Group Policy within the Microsoft Window`s EnvironmentLab 6: Creating a Scheduled Backup and Replicating System FoldersLab 7: Securing Servers with the Security Configuration Wizard and the Windows FirewallLab 8: Securing Internet Client and Server Applications on Windows SystemsLab 9: Protecting Digital Evidence, Documentation, and the Chain of CustodyLab 10: Hardening Windows Server Security Using Microsoft Baseline Security Analyzer
28
Applied Labs to Accompany Security Strategies in Linux Platforms and ApplicationsLab 1: Installing a Core Linux Operating System on a ServerLab 2: Configuring Basic Security Controls on a Centos Linux ServerLab 3: Hardening Security with User Account Management and Security ControlsLab 4: Applying Hardened Linux File System Security ControlsLab 5: Hardening Security for Linux Services and ApplicationsLab 6: Hardening Security by Controlling AccessLab 7: Hardening Security for the Linux KernelLab 8: Applying Best Practices for Security Software ManagementLab 9: Applying Best Practices for Security Logging and MonitoringLab 10: Defining Linux OS and Application Backup and Recovery Procedures
Applied Labs to Accompany Security Policies and Implementation IssuesLab 1: Crafting an Organization-Wide Security Management Policy for Acceptable UseLab 2: Developing an Organization-Wide Policy Framework Implementation PlanLab 3: Defining an Information Systems Security Policy Framework for an IT InfrastructureLab 4: Crafting a Layered Security Management Policy – Separation of DutiesLab 5: Crafting an Organization-Wide Security Awareness Policy-BIA and Recovery TimeLab 6: Defining a Remote Access Policy to Support Remote Health Care ClinicsLab 7: Identifying Necessary Policies for Business Continuity – BIA and Recovery Time ObjectivesLab 8: Crafting a Security or Computer Incident Response Policy – CIRT Response TeamLab 9: Assessing and Auditing an Existing IT Security Policy Framework DefinitionLab 10: Aligning an IT Security Policy Framework to the Seven Domains of a Typical IT Infrastructure
Applied Labs to Accompany Managing Risk in Information SystemsLab 1: Identifying Threats and Vulnerabilities in an IT InfrastructureLab 2: Aligning Risks, Threats, & Vulnerabilities to the COBIT P09 Risk Management ControlsLab 3: Defining the Scope and Structure for an IT Risk Management PlanLab 4: Performing a Qualitative Risk Assessment for an IT InfrastructureLab 5: Identifying Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap® GUI (Nmap) & Nessus® ReportsLab 6: Developing a Risk-Mitigation Plan Outline for an IT InfrastructureLab 7: Performing a Business Impact Analysis for a Mock IT InfrastructureLab 8: Developing an Outline for a Business Continuity Plan for an IT InfrastructureLab 9: Developing Disaster Recovery Backup Procedures and Recovery InstructionsLab 10: Creating a CIRT Response Plan for a Typical IT Infrastructure
Applied Labs to Accompany Legal Issues in Information SecurityLab 1: Creating an IT Infrastructure Asset List and Identifying Where Privacy Data ResidesLab 2: Case Study on U.S. Veteran Affairs and Loss of Private InformationLab 3: Case Study on PCI DSS Non-Compliance: CardSystems SolutionsLab 4: Analyzing and Comparing GLBA and HIPAALab 5: Case Study on Issues Related to Sharing Consumers’ Confidential InformationLab 6: Identifying the Scope of Your State’s Data and Security Breach Notification LawLab 7: Case Study on Digital Millennium Copyright Act: NapsterLab 8: Cyberstalking or Cyberbullying and Laws to Protect IndividualsLab 9: Recommending IT Security Policies to Help Mitigate RiskLab 10: Case Study on Computer Forensics: Pharmaceutical Company
Applied Labs to Accompany Auditing IT Infrastructure for ComplianceLab 1: Assessing the Impact of Sarbanes-Oxley (SOX) Compliance Law on EnronLab 2: Aligning Auditing Frameworks for a Business Unit Within DoDLab 3: Defining a Process for Gathering Information Pertaining to a HIPAA Compliance AuditLab 4: Aligning an IT Security Assessment – Risk, Threats, and Vulnerability Assessments – to Achieve ComplianceLab 5: Defining a Process for Gathering Information Pertaining to a GLBA Compliance AuditLab 6: Auditing the Workstation Domain for ComplianceLab 7: Auditing the LAN-to-WAN Domain for ComplianceLab 8: Auditing the Remote Access Domain for ComplianceLab 9: Auditing the Systems/Application Domain for ComplianceLab 10: Charting Your Career Path – Professional Certifications
A Complete Curriculum Solution for IT Security, Cybersecurity, Information Assurance, and Information Systems Security Programs
29
Explore NEW Updates to the Virtual Security Cloud Labs!
LAB ENVIRONMENTNEW 3.0
What’s NEW with the Virtual Security Cloud Labs!Jones & Bartlett offers students a fully immersive
mock IT infrastructure where they can test their
skills with realistic security scenarios in a safe
learning environment.
Now they’ve gotten even better! With the new Virtual Security Cloud Labs 3.0 you will find:
• NEW Content – All 80 Virtual Security Cloud Labs have been expanded to include a new Applied
Learning section and updated Lab Challenge and Analysis section to supplement the existing Hands-
On Demonstration
• NEW Lab Environment – New features and functionalities available for 3.0, including Progress Tracking,
Collapsible Lab Frame, and System Checker
• NEW Saved States Feature – No more worrying about completing each lab in one sitting! Students
now have the opportunity to save their work before exiting a virtual lab, then return to it later
• Updated Software – The 3.0 environment includes updates to the latest Operating Systems and
Software, including Windows Server 2016, Nessus Vulnerability Scanner, P2 Commander, Wireshark, and
more
• Updated Lab Manual – Now consists of the following parts:
• Introduction
• Learning Objectives
• Lab Overview (NEW)
• Instructor Notes (NEW)
• Tools and Software
• Deliverables
• Section 1: Hands-On Demonstration
• Section 2: Applied Learning (NEW)
• Section 3: Lab Challenge and Analysis
(UPDATED)
• Evaluation Criteria and Rubrics
• Lab Assessment Worksheet (UPDATED)
• Lab Assessment Quiz (UPDATED)
Contact your Account Manager to learn more about the exciting new enhancements to the Virtual Security Cloud Labs!
go.jblearning.com/FindMyRep
Check out our hands-on labs and learn more at www.issaseries.com
Whether you teach an online, on-ground, or a hybrid course, you can deliver unbeatable value to your students with Navigate 2.
eBook
Dashboard
Try It Today60 Day Trial Access Available at: www.jblnavigate.com
• Fully Hosted by Jones & Bartlett Learning
• Compatible with Blackboard and Other Third-Party Learning Management Systems
• FREE with Purchase of the Accompanying Text
• Digital-Only Access (No Print Text) Available at up to 50% Off†
• Comprehensive Support and Training
• Mobile-Ready
†Discount price may vary. Contact your Account Manager for details.
to Expand the Reach of Your Classroom
Request a Free 60-Day
Trial Access by contacting
your Account Manager.
Learn
A Complete eBook with
Interactive Tools
PracticeA Virtual Study
Center with Robust Practice Activities
& Flashcards
AssessA Homework &
Assessment Center with Pre-loaded Quizzes & Exams
AnalyzeA Dashboard that Reports
Actionable Data
Call toll free at 1-800-832-0034 and speak with one of our knowledgeable Account Managers. For fastest service, place your order at www.jblearning.com.
ORDER WITH EASE
31
Two- and Four-Year Colleges & Universities:Visit go.jblearning.com/FindMyRep to make your request.
Canada Sales:Nelson Education [email protected]
* Jones & Bartlett Learning reserves the right to evaluate requests for complimentary review copies.
Textbook Examination Copies
Complimentary* review copies are available for qualified instructors who wish to consider a text for course adoption. For fastest service, make your request online at www.jblearning.com or let our knowledgeable Account Managers help you find the text that best meets your course needs.
Contact Your Account Specialist
Facebook www.fb.com/JBLCyber
Twitter: @JBLearning
Blog: blogs.jblearning.com/computer-science
LinkedIn: www.linkedin.com/company/jones-&-bartlett-learning
Email Updates: www.jblearning.com/eUpdates
Instagram @jblearning