Hot Best Seller

Computer Security

Availability: Ready to download

A comprehensive and practical text and the perfect starting point for this subject ... 'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as: * Should protection focus on dat A comprehensive and practical text and the perfect starting point for this subject ... 'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as: * Should protection focus on data, operations or users? * Whilst taking cast iron measures to build in security at one level, what does one do to prevent attackers gaining entry from a lower level? Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. It meets a real need for a comprehensive textbook on the subject. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.


Compare

A comprehensive and practical text and the perfect starting point for this subject ... 'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as: * Should protection focus on dat A comprehensive and practical text and the perfect starting point for this subject ... 'Is this system secure?' seems, on the face of it, a straightforward question. Yet how one arrives at an answer is a process which poses a wide range of more complex questions which require a basic understanding of security mechanisms. Questions, such as: * Should protection focus on data, operations or users? * Whilst taking cast iron measures to build in security at one level, what does one do to prevent attackers gaining entry from a lower level? Starting with basic definitions and concepts, the first section of the book goes on to outline the mechanisms located at the heart of the computer system, mechanisms which provide the basis for techniques used in all other branches of the system. The second section examines the security features found in operating systems such as UNIX and Windows NT, catalogues security breaches, and introduces the topic of security evaluation. A third section is devoted to issues associated with distributed systems, such as network - and Web - security and considers cryptography as an essential technique for such environments. The final section of the book is constructed around database security, discussing problems in multi-level security, and examining security problems in specific settings. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. It meets a real need for a comprehensive textbook on the subject. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewildering array of competing security systems.

30 review for Computer Security

  1. 5 out of 5

    Frank Ahmed

    This review has been hidden because it contains spoilers. To view it, click here. great book

  2. 4 out of 5

    Beck Frost

    I had read 1st edition back in the late 1990s-early 2000s when I was obtaining my BS in a computer technology degree field. Now, I am getting my MS in a computer technology degree field and the 3rd edition was assigned for one of my classes. Honestly, I don't remember 1st edition except that I liked it well enough that I kept it for a reference book and only just let it go around 2011. 3rd edition likes to give you reference material in very much the text book format explaining everything and th I had read 1st edition back in the late 1990s-early 2000s when I was obtaining my BS in a computer technology degree field. Now, I am getting my MS in a computer technology degree field and the 3rd edition was assigned for one of my classes. Honestly, I don't remember 1st edition except that I liked it well enough that I kept it for a reference book and only just let it go around 2011. 3rd edition likes to give you reference material in very much the text book format explaining everything and then using math and other techniques when necessary to get the point of the information to the user in the simplest format. The end of chapter questions I think were about the only thing that really changed between editions as those were more on point for discussion of how to take what you just read and put it in a context of the here and now for every day usage.

  3. 4 out of 5

    John 'joseph'

    Excellent book, teaches both basics and advanced knowledge about multiple types of computers and their security. A release of a 2nd edition would be much more helpful about security systems today. More Social Engineering should be part of this book(though I did see it being mentioned multiple times).

  4. 4 out of 5

    Oto Akanam

    good

  5. 5 out of 5

    Swati

    ok

  6. 5 out of 5

    Yhgs Yhgd

    This review has been hidden because it contains spoilers. To view it, click here. no thing

  7. 5 out of 5

    Mohammed Al-Musawa

  8. 5 out of 5

    Elanor

  9. 4 out of 5

    Gurpreet Singh

  10. 5 out of 5

    Raven

  11. 4 out of 5

    Wizey

  12. 4 out of 5

    Siriol

  13. 4 out of 5

    Amab

  14. 5 out of 5

    Nader

  15. 4 out of 5

    Muhammad Bilal

  16. 4 out of 5

    Jovany Agathe

  17. 5 out of 5

    Erik Westrup

  18. 5 out of 5

    Royce Zobell

  19. 5 out of 5

    Ezekiel Jere

  20. 4 out of 5

    Ryan Finlayson

  21. 5 out of 5

    Eric

  22. 5 out of 5

    Marius Colacioiu

  23. 5 out of 5

    Tanjila

  24. 4 out of 5

    234ddd

  25. 5 out of 5

    Sarv Ir

  26. 5 out of 5

    Shivani Shukla

  27. 4 out of 5

    Sujeeth

  28. 5 out of 5

    Gordon Ku

  29. 5 out of 5

    Shady Ahmed

  30. 4 out of 5

    Hans

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.