Computer Security

Computer Security

  • Downloads:2817
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2021-03-12 08:11:53
  • Update Date:2025-09-07
  • Status:finish
  • Author:William Stallings
  • ISBN:1292220619
  • Environment:PC/Android/iPhone/iPad/Kindle

Summary

In recent years, the need for education in computer security and related topics has grown dramatically - and is essential for anyone in the fields of Computer Science or Computer Engineering。 This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject。 Comprehensive treatment of user authentication and access control。 Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures。 More detailed coverage of software security than other books。 Exploration of management issues。 Systematic, comprehensive discussion of malicious software and denial of service attacks。 Coverage of Linux and Windows Vista。 Up-to-date coverage of database security。 Thorough overview of cryptography, authentication, and digital signatures。 Coverage of Internet security。 For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study。

Download

Reviews

Friedhelm Winter

Very in-depth, had it as course book for introduction to cybersecurity and it covers wide variety of topics in good detail。

Randy Daugherty

This new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification。 This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification。 The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Crypt This new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification。 This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification。 The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security。Required reading for class, which was in many ways a refresher of security classes taken in the past, though the instructor made the class dry and boring the book is informative。 。。。more

Karel Baloun

Even though by fourth edition they claim a 2017 print date, too much of this book is out of date。 For example, the table of biometric authentication reliability data is from 2001, far before touchID and FaceID。This book tries to take on too much, and discusses a security design much more than providing examples of breaches。 In my opinion, a key part of studying security is practically reviewing recovery from failures, and concretely examining potential future attacks。 Cryptography is effectively Even though by fourth edition they claim a 2017 print date, too much of this book is out of date。 For example, the table of biometric authentication reliability data is from 2001, far before touchID and FaceID。This book tries to take on too much, and discusses a security design much more than providing examples of breaches。 In my opinion, a key part of studying security is practically reviewing recovery from failures, and concretely examining potential future attacks。 Cryptography is effectively relegated to an appendix。 The chapters seem arbitrarily ordered。This may still be the best textbook on cyber security, that shows a big market opportunity。 None of the chapters go deep enough to be sufficient for real world understanding。 。。。more

Herman

This was the textbook for our postgraduate information security course。 Having read it cover to cover, I can say that it is, if nothing else, quite thorough。 Unfortunately it is also quite dry。 But as textbooks go, this one is not bad。 It contains clear descriptions and diagrams of the important security algorithms and protocols, and offers industry insights from authors who are clearly very experienced in the field。

Benjamin Kohler

I gave this 4 stars not because I "really liked it", but because it is a solid introduction to Computer Security。Do not try to read this for fun。 It won't be。 I gave this 4 stars not because I "really liked it", but because it is a solid introduction to Computer Security。Do not try to read this for fun。 It won't be。 。。。more

Ro Drop

One of the best security books available。

Levina

Read for school。。。。

Daniel Apatiga

I read a few key chapters and skimmed a few others because they were not required。 I found that it did indeed compliment Nigel's cryptography book very well。 If you try to study computer security on your own, I suggest buying both versions (Nigel's is a free download)。 I read a few key chapters and skimmed a few others because they were not required。 I found that it did indeed compliment Nigel's cryptography book very well。 If you try to study computer security on your own, I suggest buying both versions (Nigel's is a free download)。 。。。more

Damith Rajapakse

asasasasasasa

Yodawookiee

Used as one of 3 books for my first Master's Degree class in Cyber Security。 2 stars because unless you buy this book new, you will have to pay an additional $20 to access the Appendices。 I just can't wrap my mind around selling 1 book twice & making an additional $20 for every subsequent student, who already paid too much for the book whether it was used or a rental。 It is completely jacked up to sell an incomplete book and expect extra money for the rest of it。 It has decent information, but t Used as one of 3 books for my first Master's Degree class in Cyber Security。 2 stars because unless you buy this book new, you will have to pay an additional $20 to access the Appendices。 I just can't wrap my mind around selling 1 book twice & making an additional $20 for every subsequent student, who already paid too much for the book whether it was used or a rental。 It is completely jacked up to sell an incomplete book and expect extra money for the rest of it。 It has decent information, but the same info is also covered by Panko or Smith in similar books that are sold as complete packages。 。。。more

Haneen

ITE408 :Information SecurityFall 2012-2013MoWe 10:45-12:15 pm

John Johnson

I used this course in developing my graduate fundamentals of information assurance course for Walden University。