Skip to content
Scan a barcode
Scan
Hardcover Computer Security Handbook Book

ISBN: 1118134109

ISBN13: 9781118134108

Computer Security Handbook

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Good

$7.39
Almost Gone, Only 1 Left!

Book Overview

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety... This description may be from another edition of this product.

Customer Reviews

5 ratings

The Only Book that covers all aspects of Computer Security

I am offering an IT Security undergraduate course for the first time this Fall in a Business School environment. I reviewed many books on IT security before I selected this title for my course. The vast majority of Security books are nuts-and-bolts oriented, great for Engineers and Computer Scientists but lacking depth for the IT manager.This book is a welcome relief since it contains such a wealth of information valuable to anyone working as an IT practitioner. It has several strenghts that other IS security books do not have: The current edition has been revised since the events of September 11th and thoughtfully reflects the change of the collective mindset of the IT world. Secondly, each Chapter is written by an expert in their respective fields. Thirdly, there is is a collection of references and links at the end of each Chapter which I found to be particularly valuable.My course covers about half the topics in this book. The chapters on: Information Warfare, Denial of Service Attacks, Protecting Internet Visible Systems, Public Key Infrastructure and Computer Audit stand out in my mind as outstanding.I intend to use this book again next Fall when this course is offered once more.

Text for Master's program

I recently used this book as the text for my Information Security course. The feedback from students has been outstanding. "Very current", "easy to follow", "liked the compilation of thoughts from multiple viewpoints", ect., are just some examples of the feedback.The book methodically unfolds atop a solid foundation, building on threats and vulnerabilties, and, culminating in prevention, detection, remediation and management's role. It not only had good coverage but also is very current (9/11).I highly recommend this book to both the novice and security professional. The sections by Mr. Bosworth are particularly enlightening (ie. Information Warfare).

Covers all IS Security Critical Success Factors

This book is an anthology of carefully selected papers by experts in their respective knowledge areas. The organization of the papers is consistent with the basic principle of security - layered security in depth, and covers management responsibility, basic safeguards, and physical and technical protection, and special issues.What makes this book such a valuable reference is the care with which the editors chose topics. Each topic area is a critical success factor to implementing and managing an effective security posture, and I especially like the inclusion of papers on "Policies, Standards and Procedures" and "Legal Issues in Computer Security" in the section devoted to Management Responsibility. The paper on risk management in this section is also excellent.The section on basic safeguards actually goes beyond the domain of IS security by addressing disaster recovery (this discipline is independent of IS security, but is closely related), and cross functional topics, such as auditing and application controls. These topics are the core of IS security and I was pleased to see them included in the form of exceptionally well written, in-depth papers.Other highlights, in my opinion, are "Security of Computer Data, Records, and Forms" (an often overlooked, but critical element of IS security), and "Outside Services". Both of these papers show the width and depth of the topics covered in this excellent book. If you are an IS security manager this book is an essential desk reference, and it is also useful to anyone managing production support and service delivery functions, or tasked with vendor management. In my opinion this is one of the best IS security references available and I highly recommend it.

The InfoSec Bible... Simply put, a MUST have!

This book is the Bible of information security. I stumbled into the 3rd edition (published in 1995) years ago and found it quite helpful, but dated by the time I acquired it. I was simply stunned and enthralled when I discovered a 4th edition had been published. I ordered it immediately, and waited impatiently to arrive... (2 day air)... I received it today, and I can't put it down. It has completely exceeded my expectations, which were considerable given I was very much impressed with the 3rd. This book belongs in any security professionals library. If you haven't got it, you are missing the definitive compendium of security information. Once you have mastered this text, other books do an excellent job of drilling further into the details, but few can exceed the sheer scope and thoroughness of this tome. For those worried about acquiring obsolete texts, this edition is completely current and up to date! Very impressive. Highly recommmended.

The Must-Have IT Security Guide

This is an amazing book stuffed with details of every facet of Information Technology Security. If you can't find the security guidance you want here, it doesn't exist. The material is neatly organizated into eight parts with a detailed index to make it easy to find answers. I found that by turning the pages and looking at the figures, I discovered all kinds of topics I hadn't previously thought about. Full disclosure requires me to announce that I wrote Chapter 47, and collaborated on Chapter 1, but this hasn't skewed my view of all the other chapters as outstanding work by all the other authors.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured