web site hit counter Computer Security: Principles and Practice - Ebooks PDF Online
Hot Best Seller

Computer Security: Principles and Practice

Availability: Ready to download

In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authenticati In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.


Compare

In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authenticati In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone in the fields of Computer Science or Computer Engineering. This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

30 review for Computer Security: Principles and Practice

  1. 4 out of 5

    Benjamin Kohler

    I gave this 4 stars not because I "really liked it", but because it is a solid introduction to Computer Security. Do not try to read this for fun. It won't be. I gave this 4 stars not because I "really liked it", but because it is a solid introduction to Computer Security. Do not try to read this for fun. It won't be.

  2. 5 out of 5

    Karel Baloun

    Even though by fourth edition they claim a 2017 print date, too much of this book is out of date. For example, the table of biometric authentication reliability data is from 2001, far before touchID and FaceID. This book tries to take on too much, and discusses a security design much more than providing examples of breaches. In my opinion, a key part of studying security is practically reviewing recovery from failures, and concretely examining potential future attacks. Cryptography is effectively Even though by fourth edition they claim a 2017 print date, too much of this book is out of date. For example, the table of biometric authentication reliability data is from 2001, far before touchID and FaceID. This book tries to take on too much, and discusses a security design much more than providing examples of breaches. In my opinion, a key part of studying security is practically reviewing recovery from failures, and concretely examining potential future attacks. Cryptography is effectively relegated to an appendix. The chapters seem arbitrarily ordered. This may still be the best textbook on cyber security, that shows a big market opportunity. None of the chapters go deep enough to be sufficient for real world understanding.

  3. 4 out of 5

    Herman

    This was the textbook for our postgraduate information security course. Having read it cover to cover, I can say that it is, if nothing else, quite thorough. Unfortunately it is also quite dry. But as textbooks go, this one is not bad. It contains clear descriptions and diagrams of the important security algorithms and protocols, and offers industry insights from authors who are clearly very experienced in the field.

  4. 5 out of 5

    Friedhelm Winter

    Very in-depth, had it as course book for introduction to cybersecurity and it covers wide variety of topics in good detail.

  5. 4 out of 5

    Randy Daugherty

    This new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Crypt This new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security. Required reading for class, which was in many ways a refresher of security classes taken in the past, though the instructor made the class dry and boring the book is informative.

  6. 4 out of 5

    Yodawookiee

    Used as one of 3 books for my first Master's Degree class in Cyber Security. 2 stars because unless you buy this book new, you will have to pay an additional $20 to access the Appendices. I just can't wrap my mind around selling 1 book twice & making an additional $20 for every subsequent student, who already paid too much for the book whether it was used or a rental. It is completely jacked up to sell an incomplete book and expect extra money for the rest of it. It has decent information, but t Used as one of 3 books for my first Master's Degree class in Cyber Security. 2 stars because unless you buy this book new, you will have to pay an additional $20 to access the Appendices. I just can't wrap my mind around selling 1 book twice & making an additional $20 for every subsequent student, who already paid too much for the book whether it was used or a rental. It is completely jacked up to sell an incomplete book and expect extra money for the rest of it. It has decent information, but the same info is also covered by Panko or Smith in similar books that are sold as complete packages.

  7. 4 out of 5

    Daniel Apatiga

    I read a few key chapters and skimmed a few others because they were not required. I found that it did indeed compliment Nigel's cryptography book very well. If you try to study computer security on your own, I suggest buying both versions (Nigel's is a free download). I read a few key chapters and skimmed a few others because they were not required. I found that it did indeed compliment Nigel's cryptography book very well. If you try to study computer security on your own, I suggest buying both versions (Nigel's is a free download).

  8. 4 out of 5

    Damith Rajapakse

    asasasasasasa

  9. 5 out of 5

    John Johnson

    I used this course in developing my graduate fundamentals of information assurance course for Walden University.

  10. 5 out of 5

    Andrew Leeth

  11. 4 out of 5

    Kristen

  12. 4 out of 5

    Ashley

  13. 5 out of 5

    Ed

  14. 4 out of 5

    Steven

  15. 5 out of 5

    François Landry

  16. 5 out of 5

    Sajjad Kadhim

  17. 4 out of 5

    Holland

  18. 4 out of 5

    Kellan

  19. 5 out of 5

    Thno

  20. 5 out of 5

    Mary

  21. 5 out of 5

    Robby Fussell

  22. 4 out of 5

    Olivier Gilbert

  23. 5 out of 5

    John Wilkins

  24. 4 out of 5

    Dustin Dalen

  25. 4 out of 5

    Patrick

  26. 5 out of 5

    Thuận Dương Đình

  27. 4 out of 5

    William Hunt

  28. 4 out of 5

    Lou

  29. 4 out of 5

    George Jacob

  30. 5 out of 5

    Ryan Bruzgulis

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.