Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Security in Computing, Third Edition

Security in Computing, Third Edition

List Price: $79.00
Your Price: $75.05
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Clear, Comprehensive Coverage of a Complex Subject
Review: An excellent book. I highly recommend it to software engineers and other computer scientists who desire a good foundation in computer security topics. It is comprehensive, well organized, and chock full of clear, concise examples which assist the reader in understanding complex subjects. The many "real world" vignettes, many of which were fascinating to read, lent credibility and urgency to this important field of study. I would use it as the basis for an undergraduate or graduate course in this field.

Rating: 5 stars
Summary: Clear, Comprehensive Coverage of a Complex Subject
Review: An excellent book. I highly recommend it to software engineers and other computer scientists who desire a good foundation in computer security topics. It is comprehensive, well organized, and chock full of clear, concise examples which assist the reader in understanding complex subjects. The many "real world" vignettes, many of which were fascinating to read, lent credibility and urgency to this important field of study. I would use it as the basis for an undergraduate or graduate course in this field.

Rating: 1 stars
Summary: This information is very dated.
Review: Except for the cryptography section, this book was of no use to me. At school, this is the required class text but our professor told us to forget about it and go buy Hacking Exposed. I suggest you do the same if you want a more Hands-On practical approach.

Rating: 1 stars
Summary: This information is very dated.
Review: Except for the cryptography section, this book was of no use to me. At school, this is the required class text but our professor told us to forget about it and go buy Hacking Exposed. I suggest you do the same if you want a more Hands-On practical approach.

Rating: 2 stars
Summary: Rated this book, my ratings were deleted, here it is again!
Review: Good book but not for beginners. The author fails to explain many concepts to a level of detail that makes it easy to understand. This book can easily be understood by computer security expert! I spent hours asking these types of questions "What does he mean?", "Why is he assuming I know this and that?", "Where is the example". Hard to understand concepts can easily be undertandable by giving examples. This book doesn't give you examples much. Encryption algorithms without examples? oof!

Rating: 5 stars
Summary: Great
Review: I used this for an intro-level graduate class in computer security, and I thought Pfleeger's presentation was great. He lays out a very useful framework in which to evaluate and study security issues. The only problem is that I used the 2nd edition in late 2002, which made it kind of dated. However, that drawback is nothing good web research can't more than make up for; the book is still a good (no- very good) textbook!

Rating: 5 stars
Summary: I want to preview your book
Review: I want to see Teaching Note. Specially, Ch2 (Concept), Ch3 (Security system)

Rating: 5 stars
Summary: An outstanding text and reference in the INFOSEC Field
Review: In 1989, I read the first edition of "Security in Computing" which was one of the best books in the information security field. Fourteen years later, I find the 2003 third edition even better. This is my primary textbook in a graduate course I teach. I also recommend this text to commercial students who are in my CISSP Common Body of Knowledge seminars. What I like best about this book is the index and the bibliography. Personally, I use this text as a reference to remind myself of the concise descriptions of some difficult security issues or protocols. I also recommend this book for managers to develop insights for interviewing potential candidates. The book, just like the field, is very broad and can assist you in understanding the big picture view in information security. It can help you focus on requirements in the development of a secure computing environment and develop some metrics as you define your security architecture. Having spent several decades in the information security field, I find this to be an excellent book for the classroom as well as the reference shelf of information security practitioner and manager in an enterprise environment.

J Holleran, CISSP
Retired Technical Director
National Computer Security Center

Rating: 5 stars
Summary: An outstanding text and reference in the INFOSEC Field
Review: In 1989, I read the first edition of "Security in Computing" which was one of the best books in the information security field. Fourteen years later, I find the 2003 third edition even better. This is my primary textbook in a graduate course I teach. I also recommend this text to commercial students who are in my CISSP Common Body of Knowledge seminars. What I like best about this book is the index and the bibliography. Personally, I use this text as a reference to remind myself of the concise descriptions of some difficult security issues or protocols. I also recommend this book for managers to develop insights for interviewing potential candidates. The book, just like the field, is very broad and can assist you in understanding the big picture view in information security. It can help you focus on requirements in the development of a secure computing environment and develop some metrics as you define your security architecture. Having spent several decades in the information security field, I find this to be an excellent book for the classroom as well as the reference shelf of information security practitioner and manager in an enterprise environment.

J Holleran, CISSP
Retired Technical Director
National Computer Security Center

Rating: 4 stars
Summary: a good book
Review: in todays ever continuously evolving world of IT, the security issues are the prime concer for any computre user. There are so many aspects to this field that an average person does not even know what to do to keep himself abreast.

This book helps in understanding the various techniques and ways to help understand the security concerns and makes the reader more aware about what he can take care of.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates