Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Computer Security Handbook

Computer Security Handbook

List Price: $85.00
Your Price: $78.21
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: A simple, complete, and practical IA reference we all need
Review: I always wanted to invite as many experts to speak to my students to demonstrate the applied side of IA and to complement and make sense of the overwhelming theory we bring to class. This book contained just the best paper selection any graduate IA course needs to efficiently convey real-world experience to students. The book presented vigorously the security concepts needed and covered management responsibility, basic safeguards, and physical and technical security solutions. The book also covered security policy and planning an area that is often overlooked in the IA literature. My students and I really enjoyed this book.
This book is comprehensive and complete. It is also efficiently organized into sections and well indexed and hence simple to search and read. This book is certainly a valuable reference that instructors and students have to have as a textbook. This book is also an excellent and essential desk reference any IS security administrator or IT manager needs.

Rating: 5 stars
Summary: The Only Book that covers all aspects of Computer Security
Review: I am offering an IT Security undergraduate course for the first time this Fall in a Business School environment. I reviewed many books on IT security before I selected this title for my course. The vast majority of Security books are nuts-and-bolts oriented, great for Engineers and Computer Scientists but lacking depth for the IT manager.

This book is a welcome relief since it contains such a wealth of information valuable to anyone working as an IT practitioner. It has several strenghts that other IS security books do not have: The current edition has been revised since the events of September 11th and thoughtfully reflects the change of the collective mindset of the IT world. Secondly, each Chapter is written by an expert in their respective fields. Thirdly, there is is a collection of references and links at the end of each Chapter which I found to be particularly valuable.

My course covers about half the topics in this book. The chapters on: Information Warfare, Denial of Service Attacks, Protecting Internet Visible Systems, Public Key Infrastructure and Computer Audit stand out in my mind as outstanding.

I intend to use this book again next Fall when this course is offered once more.

Rating: 5 stars
Summary: The Only Book that covers all aspects of Computer Security
Review: I am offering an IT Security undergraduate course for the first time this Fall in a Business School environment. I reviewed many books on IT security before I selected this title for my course. The vast majority of Security books are nuts-and-bolts oriented, great for Engineers and Computer Scientists but lacking depth for the IT manager.

This book is a welcome relief since it contains such a wealth of information valuable to anyone working as an IT practitioner. It has several strenghts that other IS security books do not have: The current edition has been revised since the events of September 11th and thoughtfully reflects the change of the collective mindset of the IT world. Secondly, each Chapter is written by an expert in their respective fields. Thirdly, there is is a collection of references and links at the end of each Chapter which I found to be particularly valuable.

My course covers about half the topics in this book. The chapters on: Information Warfare, Denial of Service Attacks, Protecting Internet Visible Systems, Public Key Infrastructure and Computer Audit stand out in my mind as outstanding.

I intend to use this book again next Fall when this course is offered once more.

Rating: 5 stars
Summary: Text for Master's program
Review: I recently used this book as the text for my Information Security course. The feedback from students has been outstanding. "Very current", "easy to follow", "liked the compilation of thoughts from multiple viewpoints", ect., are just some examples of the feedback.

The book methodically unfolds atop a solid foundation, building on threats and vulnerabilties, and, culminating in prevention, detection, remediation and management's role. It not only had good coverage but also is very current (9/11).

I highly recommend this book to both the novice and security professional. The sections by Mr. Bosworth are particularly enlightening (ie. Information Warfare).

Rating: 5 stars
Summary: Text for Master's program
Review: I recently used this book as the text for my Information Security course. The feedback from students has been outstanding. "Very current", "easy to follow", "liked the compilation of thoughts from multiple viewpoints", ect., are just some examples of the feedback.

The book methodically unfolds atop a solid foundation, building on threats and vulnerabilties, and, culminating in prevention, detection, remediation and management's role. It not only had good coverage but also is very current (9/11).

I highly recommend this book to both the novice and security professional. The sections by Mr. Bosworth are particularly enlightening (ie. Information Warfare).

Rating: 5 stars
Summary: Excellent info security reference
Review: Overall, the Computer Security Handbook is about the best single-source book on computer security available.

The topics cover just about every area of infosec.

On one side, the fact that the book has chapters from over 30 authors makes the book lack a consistent style. On the other side, the diversity of authors shows various points of view for an assortment of different security topics.

The overall orderliness of the chapter's developers in a coherent manner. It starts with the basics of information security and then develops into higher-level issues.

Taken as a whole, the Computer Security Handbook is an excellent reference.

Rating: 5 stars
Summary: THE Security Reference To Own
Review: Previous reviews here do not exaggerate the excellence and value of this book. It is totally up-to-date (2/2002), incredibly complete and entirely readable. This is an excellent resource, regardless of your level of expertise. It contains the A to Z for mainframe, PC and network threats, vulnerabilities, prevention, detection, remediation, and encryption, among other thought-provoking topics.

You may be able to find this book for less elsewhere, (I did) but if you can't, don't let that deter you from purchasing this volume. It is an absolute must for any security practioner.

Rating: 5 stars
Summary: Computer Security Handbook
Review: This book is a must have for anyone working in the Information Assurance/Computer Security field. "Big Blue" was written by experienced professionals who are considered experts in their field. The book contains sections pertaining to every conceivable aspect of Infomation Assurance. I am currently using this book in my Masters program at Norwich University, and will continue to use it as a reference for many years to come. Mich Kabay and Sy Bosworth are to be commended for consolidating all of this information into one superb book. Great job!!

Rating: 5 stars
Summary: Computer Security Handbook
Review: This book is a must have for anyone working in the Information Assurance/Computer Security field. "Big Blue" was written by experienced professionals who are considered experts in their field. The book contains sections pertaining to every conceivable aspect of Infomation Assurance. I am currently using this book in my Masters program at Norwich University, and will continue to use it as a reference for many years to come. Mich Kabay and Sy Bosworth are to be commended for consolidating all of this information into one superb book. Great job!!

Rating: 5 stars
Summary: Computer Security Handbook
Review: This book is a must have for anyone working in the Information Assurance/Computer Security field. "Big Blue" was written by experienced professionals who are considered experts in their field. The book contains sections pertaining to every conceivable aspect of Infomation Assurance. I am currently using this book in my Masters program at Norwich University, and will continue to use it as a reference for many years to come. Mich Kabay and Sy Bosworth are to be commended for consolidating all of this information into one superb book. Great job!!


<< 1 2 >>

© 2004, ReviewFocus or its affiliates