1. Introduction
This manual serves as a comprehensive guide to the book "Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin." It provides a structured overview of the book's content, its intended audience, and how to effectively utilize it for learning and reference. The book offers a concise yet thorough exploration of computer and Internet security, designed to provide a solid foundation in the field.
2. Intended Audience and How to Use This Book
This book is primarily designed for junior/senior undergraduate or first-year graduate students taking an introductory course in computer and Internet security. Additionally, it is an excellent resource for self-study by individuals seeking a strong understanding of security, including software developers, computing professionals, technical managers, and government staff.
To maximize your learning:
- For Coursework: Follow the chapter progression as it builds foundational knowledge. Utilize the inline exercises to reinforce concepts.
- For Self-Study: Focus on the core topics, using the optional content for deeper dives as needed. The book's brevity ensures a broad understanding without sacrificing essential detail.
- Prerequisites: While no prior security background is assumed, a basic understanding of operating system and networking concepts is helpful. Review sections are included to summarize essential background information.
3. Core Concepts and Book Structure
The book is structured to provide a clear framework for understanding computer and Internet security. It begins with an overview and introduces 20 fundamental design principles for security, which are revisited throughout the subsequent chapters. These principles are crucial for recognizing and avoiding recurring security-related error patterns in system designs.
Key Topics Covered:
- Fundamental academic concepts in security.
- Real-world incidents and applied problems.
- Wireless LAN security (Wi-Fi and 802.11).
- Bitcoin, Ethereum, blockchains, and cryptocurrencies.
- Authentication and identity management.
- Software security and applied cryptography.
The book maintains technical rigor without relying on complex mathematical proofs or extensive source-code examples, making it accessible to a broad audience while still providing concrete illustrations of concepts and principles.
4. Further Study and Reference
For those wishing to delve deeper, the book includes several features to facilitate further learning:
- Inline Exercises: Practice and solidify your understanding of the material.
- Supplemental References and Endnotes: Each chapter provides pointers to additional research literature and relevant standards from organizations like the Internet Engineering Task Force (IETF) and the U.S. National Institute of Standards and Technology (NIST).
- Glossary/Index: (If applicable, not explicitly stated but common in technical books) Use the index to quickly locate specific topics and definitions.
5. Specifications
| Attribute | Detail |
|---|---|
| Publisher | Springer |
| Publication Date | October 14, 2021 |
| Edition | 2nd ed. 2021 |
| Language | English |
| Print Length | 475 pages |
| ISBN-10 | 3030834107 |
| ISBN-13 | 978-3030834104 |
| Item Weight | 2.16 pounds |
| Dimensions | 7 x 1.25 x 10 inches |
| Part of Series | Information Security and Cryptography |
6. Publisher Information
This book is published by Springer, a leading global scientific, technical, and medical portfolio, providing researchers in academia, scientific institutions and corporate R&D departments with quality content through innovative information products and services.
For inquiries regarding the content, errata, or academic use, please refer to the publisher's official website or contact their support channels directly.





