Computer Security

Product Description
This is a brand new edition of the best-selling computer security book. Written for self-study and course use, this book will suit a variety of introductory and more advanced security programmes for students of computer science, engineering and related disciplines. Technical and project managers will also find that the broad coverage offers a great starting point for discovering underlying issues and provides a means of orientation in a world populated by a bewilder… More >>

Computer Security

5 replies
  1. C. Jones says:

    I am taking a Data and Network Security course at my University and they are using this book as the text. It is an excellent text and written very plainly in a clear and definitive manner. Consider it an excellent overview.
    Rating: 5 / 5

  2. Decius says:

    i used this book in a university course, i got very little out of it. it had handwavy explanations for almost every topic it discussed. when i tried to actually use the material, i found it useless because it skipped all the details. i had to spend hours on hours googling and wikiing to find information that the bok should have had.
    Rating: 1 / 5

  3. Satya Newday says:

    This is not an introductory book, or even a well though out or edited entry level graduate book. As I pointed out in the title of my review, I am a university student already familiar with security having had an introductory security course and two other technical security courses. I found this book to be overly complex and would not recommend it.

    I am editing out most of my previous review. I misspoke and the author does make a case for users being a major threat to computer security. His book attempts to deepen the technical subject of security, unfortunately he does so by making it over complex, although in fairness I must say he does make roads into illuminating security being created at the kernal level. Otherwise I found little comparable value in it and having taken two additional graduate courses on security and can whole heartily endorse Charles and Shari Lawrence Pfleeger’s Security in computing, for those with a little computer back ground this book will take you far.

    Satya

    Rating: 1 / 5

  4. Brian Bowman says:

    Dieter Gollmann’s “Computer Security” provides an excellent survey of the fundamental science relating to the book’s title. As stated in the Editorial Review, it is intended as a graduate Computer Science textbook. While this may be true, it is also valuable for anyone tasked with designing security into an application or distributed system.

    The book provides a macro-level introduction to the primary subject areas involved in securing operating, network, and database systems, with varying levels of exposure to theoretical foundations, architectural tradeoffs, and practical implementations. These “varying levels” are perhaps the one difficulty I have with the book, because the treatment of some topic left me with an uneven understanding with respect to other important topics. For example:

    In PART 1 FUNDAMENTALS, Chapter 3 (Access Control) lays thorough conceptual groundwork for understanding Chapter 4 (Security Models) which covers the theoretical development (Set Theory and Partial Order Relations) of formal Access Control Models.

    These subjects are “bread and butter” to operating/database system security designers and receive very robust treatment given the overall dimensions of the book. However, other primary security topics (e.g. Cryptography) do not get enough fundamental explanation to leave an uninitiated reader with a sense of understanding. Perhaps, this dilemma is endemic to computer security itself – a paradigm that requires deep multi-disciplinary subject understanding to master. However, “Computer Security” does mitigate this apparent deficiency by providing a comprehensive Bibliography complete with 163 separate entries.
    Rating: 5 / 5

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.