File Size: 39002 KB
Print Length: 672 pages
Simultaneous Device Usage: Up to 2 simultaneous devices, per publisher limits
Publisher: Pearson; 4 edition (February 19, 2014)
Publication Date: February 19, 2014
Sold by: Digital Services LLC
Text-to-Speech: Not enabled
X-Ray for Textbooks: Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #298,866 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #246 in Books > Computers & Technology > Security & Encryption > Privacy & Online Safety #1125 in Books > Computers & Technology > Networking & Cloud Computing > Internet, Groupware, & Telecommunications #4247 in Kindle Store > Kindle eBooks > Computers & Technology
I loved this book. My information systems security professor stayed close to what was covered in this book. This book was perfect for me. I have been a programmer professionally for three and a half years, and this book was exactly what I was looking for in understanding how to secure applications and networks. Note that only one of about ten chapters talks specifically about application security, which is great because we programmers have heard ad nauseum about SQL injection and such so want a broader understanding of how to secure the whole infrastructure.
This was a truly excellent introductory textbook on computer security. I would especially like to praise "Module A," the appendix section which teaches the basics of computer communication from the ground up. This was a great way to gain a thorough understanding of basic-level network traffic, which builds a solid foundation from which readers can understand the rest of the material.The chapters are long but thorough, with useful and interesting case studies peppered throughout. The boom is written on a level such that a person with a basic Bachelor's-level education in another field can understand the concepts even without a technical background in computers.As this is a textbook, I suspect most purchasers will be buying it because they are required to for a course. Just let this review serve as notice that you are, indeed, getting your money's worth.
Great textbook! We used this for our Enterprise Security course, and it was extremely well-written, understandable, and the exercises at the end were great. Loved having a glossary, since IT terminology is still new to me. Highly recommend!
The only problem i have with this book is that i was sent the Instructor's Review Copy instead of the student copy. There isn't much difference - but its hard to reference material from my professor's guidance because the information i'm often looking for isn't on the same page as with the student edition.
I been using this book for one of my graduate classes. I like the style in which it was written, it is easy to comprehend the material, and the questions at the end of each sections really help you understand more.Sometimes, I wish they elaborate more on a subject but it has serve its purpose till now.
This book really helped for my IT course! Very well laid out!
Need indicate the version of book, I'm looking for newest version, which is 5th version.
Great book. Quite easy to understand considering there are lots of concepts to grasp.
Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Hacking: Beginner's Guide to Computer Hacking, Basic Security, Penetration Testing (Hacking, How to Hack, Penetration Testing, Basic security, Computer Hacking) Corporate Computer Security HACKING: Beginner's Crash Course - Essential Guide to Practical: Computer Hacking, Hacking for Beginners, & Penetration Testing (Computer Systems, Computer Programming, Computer Science Book 1) Wealth By Stealth: Corporate Crime, Corporate Law, and the Perversion of Democracy Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Hacking: How to Hack Computers, Basic Security and Penetration Testing (Hacking, How to Hack, Hacking for Dummies, Computer Hacking, penetration testing, basic security, arduino, python) Practical UNIX and Internet Security (Computer Security) Network Security: Private Communications in a Public World (Radia Perlman Series in Computer Networking and Security) Principles of Computer Security: CompTIA Security+ and Beyond [With CDROM] (Official Comptia Guide) Security, Rights, & Liabilities in E-Commerce (Artech House Computer Security Series) Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing (Computer Science Series) Hacking: Computer Hacking for beginners, how to hack, and understanding computer security! Corporate Security Handbook (Shadowrun) Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) The Ultimate Guide to WordPress Security: Secure and protect your WordPress website form hackers and protect your data, get up to date security updates IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data Hacking: Basic Security, Penetration Testing and How to Hack (hacking, how to hack, penetration testing, basic security, arduino, python, engineering) Security Strategies In Linux Platforms And Applications (Information Systems Security & Assurance) CompTIA Security+ Guide to Network Security Fundamentals