Hardcover: 944 pages
Publisher: Prentice Hall; 5 edition (February 5, 2015)
Product Dimensions: 7.2 x 1.4 x 9.2 inches
Shipping Weight: 2.8 pounds (View shipping rates and policies)
Average Customer Review: 4.7 out of 5 stars See all reviews (6 customer reviews)
Best Sellers Rank: #37,028 in Books (See Top 100 in Books) #36 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #41 in Books > Textbooks > Computer Science > Networking #122 in Books > Computers & Technology > Security & Encryption
I read and review about 30 books a year on average, plus spend most of my days researching and writing about digital security. I've been doing this routine since 1989 so I have a so-so understanding of cyber security. Security in Computing took me by surprise since it looked like the average security 101 book I read way too often. This book is nothing like any security book I've read before except a few dissertation pieces I've picked up.The 910 page book is filled with heavy research and plenty of great real world examples. One of the first things I noticed was that many of the references were from the 1960s, 70s, 80s and 90s. This tells me that the authors went back to old school style and not just internet searches for content. If you do nothing else, get this book just for the bibliography. It is amazing because it is filled with old ideas that we still haven't learned in security.From a depth standpoint, this book should be mandatory reading for anyone after they obtain their CISSP. The Pfleegers and Margulies do a great job of presenting deeper understandings of security concepts along with pictures and examples from recent security failures. They stick to the basics of confidentiality, integrity and availability (CIA) but build off of those to show the reader how those concepts extend to a much wider field of study.This is not a classroom textbook, this is a manual on digital security with all the juicy stories that didn't make the headlines and all the original papers written before blogs existed. You will find exercises at the end of each chapter that are fairly well written but it's kind of difficult to complete the exercises when your jaw is still on the floor.
This book is a beast!!! It is 100 % textbook, with a lot of exercises at the end of the chapters. If your class uses this book, get ready for a fire hose of information. It covers a ton of topics and covers them in depth.Although it is a text book the authors do there best to keep it interesting. I really enjoyed the sidebars that include true stories of security breaches. I really like the ones that find out what the criminal was thinking. Some of the reasons for doing what they do are nuts.One of the biggest problems with security I see today is the security teams oftentimes don't know what to secure, or how to secure stuff when they do. This book starts out with a really nice introduction to what computer security is. The author discusses Values of Assets, the Vulnerability–Threat–Control Paradigm, Confidentiality, Integrity, Availability, Types of Threats, Types of Attackers, Risk and Common Sense, Method–Opportunity–Motive, Vulnerabilities, and Controls. By the time you are done this chapter you have a high level few of today's security issues.1. Introduction2. Toolbox: Authentication, Access Control, and Cryptography3. Programs and Programming4. The Web—User Side5. Operating Systems6. Networks7. Databases8. Cloud Computing9. Privacy10. Management and Incidents11. Legal Issues and Ethics12. Details of Cryptography13. Emerging TopicsI was glad to see information on regulations, compliance, and laws. They can wreak havoc on an organization's productivity when left to an unqualified security team. I usually find that IT organizations that have locked down everything from the Internet to your USBs, have no concept of how to implement security in a managed and efficient way.
Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Security in Computing (5th Edition) GPU Computing Gems Emerald Edition (Applications of GPU Computing Series) Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Student Solutions Manual for Differential Equations: Computing and Modeling and Differential Equations and Boundary Value Problems: Computing and Modeling Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing Differential Equations and Boundary Value Problems: Computing and Modeling (5th Edition) (Edwards/Penney/Calvis Differential Equations) Differential Equations: Computing and Modeling (5th Edition) (Edwards/Penney/Calvis Differential Equations) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) CompTIA Security+ Guide to Network Security Fundamentals Fundamentals Of Information Systems Security (Information Systems Security & Assurance) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security) Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance) Laboratory Manual To Accompany Security Strategies In Linux Platforms And Applications (Jones & Bartlett Learning Information Systems Security & Assurance Series)