Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Clear, Comprehensive Coverage of a Complex Subject Review: An excellent book. I highly recommend it to software engineers and other computer scientists who desire a good foundation in computer security topics. It is comprehensive, well organized, and chock full of clear, concise examples which assist the reader in understanding complex subjects. The many "real world" vignettes, many of which were fascinating to read, lent credibility and urgency to this important field of study. I would use it as the basis for an undergraduate or graduate course in this field.
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Clear, Comprehensive Coverage of a Complex Subject Review: An excellent book. I highly recommend it to software engineers and other computer scientists who desire a good foundation in computer security topics. It is comprehensive, well organized, and chock full of clear, concise examples which assist the reader in understanding complex subjects. The many "real world" vignettes, many of which were fascinating to read, lent credibility and urgency to this important field of study. I would use it as the basis for an undergraduate or graduate course in this field.
Rating: ![1 stars](http://www.reviewfocus.com/images/stars-1-0.gif) Summary: This information is very dated. Review: Except for the cryptography section, this book was of no use to me. At school, this is the required class text but our professor told us to forget about it and go buy Hacking Exposed. I suggest you do the same if you want a more Hands-On practical approach.
Rating: ![1 stars](http://www.reviewfocus.com/images/stars-1-0.gif) Summary: This information is very dated. Review: Except for the cryptography section, this book was of no use to me. At school, this is the required class text but our professor told us to forget about it and go buy Hacking Exposed. I suggest you do the same if you want a more Hands-On practical approach.
Rating: ![2 stars](http://www.reviewfocus.com/images/stars-2-0.gif) Summary: Rated this book, my ratings were deleted, here it is again! Review: Good book but not for beginners. The author fails to explain many concepts to a level of detail that makes it easy to understand. This book can easily be understood by computer security expert! I spent hours asking these types of questions "What does he mean?", "Why is he assuming I know this and that?", "Where is the example". Hard to understand concepts can easily be undertandable by giving examples. This book doesn't give you examples much. Encryption algorithms without examples? oof!
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: Great Review: I used this for an intro-level graduate class in computer security, and I thought Pfleeger's presentation was great. He lays out a very useful framework in which to evaluate and study security issues. The only problem is that I used the 2nd edition in late 2002, which made it kind of dated. However, that drawback is nothing good web research can't more than make up for; the book is still a good (no- very good) textbook!
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: I want to preview your book Review: I want to see Teaching Note. Specially, Ch2 (Concept), Ch3 (Security system)
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: An outstanding text and reference in the INFOSEC Field Review: In 1989, I read the first edition of "Security in Computing" which was one of the best books in the information security field. Fourteen years later, I find the 2003 third edition even better. This is my primary textbook in a graduate course I teach. I also recommend this text to commercial students who are in my CISSP Common Body of Knowledge seminars. What I like best about this book is the index and the bibliography. Personally, I use this text as a reference to remind myself of the concise descriptions of some difficult security issues or protocols. I also recommend this book for managers to develop insights for interviewing potential candidates. The book, just like the field, is very broad and can assist you in understanding the big picture view in information security. It can help you focus on requirements in the development of a secure computing environment and develop some metrics as you define your security architecture. Having spent several decades in the information security field, I find this to be an excellent book for the classroom as well as the reference shelf of information security practitioner and manager in an enterprise environment.J Holleran, CISSP Retired Technical Director National Computer Security Center
Rating: ![5 stars](http://www.reviewfocus.com/images/stars-5-0.gif) Summary: An outstanding text and reference in the INFOSEC Field Review: In 1989, I read the first edition of "Security in Computing" which was one of the best books in the information security field. Fourteen years later, I find the 2003 third edition even better. This is my primary textbook in a graduate course I teach. I also recommend this text to commercial students who are in my CISSP Common Body of Knowledge seminars. What I like best about this book is the index and the bibliography. Personally, I use this text as a reference to remind myself of the concise descriptions of some difficult security issues or protocols. I also recommend this book for managers to develop insights for interviewing potential candidates. The book, just like the field, is very broad and can assist you in understanding the big picture view in information security. It can help you focus on requirements in the development of a secure computing environment and develop some metrics as you define your security architecture. Having spent several decades in the information security field, I find this to be an excellent book for the classroom as well as the reference shelf of information security practitioner and manager in an enterprise environment. J Holleran, CISSP Retired Technical Director National Computer Security Center
Rating: ![4 stars](http://www.reviewfocus.com/images/stars-4-0.gif) Summary: a good book Review: in todays ever continuously evolving world of IT, the security issues are the prime concer for any computre user. There are so many aspects to this field that an average person does not even know what to do to keep himself abreast. This book helps in understanding the various techniques and ways to help understand the security concerns and makes the reader more aware about what he can take care of.
|