Foundations of Computer Security

Author:   David Salomon
Publisher:   Springer London Ltd
Edition:   2006 ed.
ISBN:  

9781846281938


Pages:   369
Publication Date:   23 December 2005
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $103.47 Quantity:  
Add to Cart

Share |

Foundations of Computer Security


Add your own review!

Overview

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided. Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Full Product Details

Author:   David Salomon
Publisher:   Springer London Ltd
Imprint:   Springer London Ltd
Edition:   2006 ed.
Dimensions:   Width: 17.80cm , Height: 2.20cm , Length: 25.40cm
Weight:   2.120kg
ISBN:  

9781846281938


ISBN 10:   1846281938
Pages:   369
Publication Date:   23 December 2005
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Reviews

From the reviews: ...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend. (Richard Jankowski, The Book Review Column by William Gasarch, 2008) the book is an easy-to-read collection of practical knowledge. ...a useful collection of in-depth knowledge... Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. ...worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations. (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007) The intended audience of this book is newcomers ... . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. ... much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material. (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008)


From the reviews: ...a very nice and well-written introduction to the essential concepts of computer security. ... The book is loaded with examples and exercises that are useful in learning the material. ... This is a book I would not hesitate to give to someone who had very little computer experience and wanted to learn the core concepts of security. The material covered is very broad in scope; however the essentials were well treated and easy to comprehend. (Richard Jankowski, The Book Review Column by William Gasarch, 2008) the book is an easy-to-read collection of practical knowledge. ...a useful collection of in-depth knowledge... Exercises throughout the chapters make this book entertaining to read, and keep readers actively involved. ...worth its price for lecturers and professionals who need in-depth stories to enrich their lectures and presentations. (Edgar R. Weippl, ACM Computing Reviews, Vol. 48 (5), May 2007) The intended audience of this book is newcomers ... . a very nice and well-written introduction to the essential concepts of computer security. The content was written in an easy tone that would make it approachable to a security neophyte. The book is loaded with examples and exercises that are useful in learning the material. ... much of the content is written in bulleted lists. In my opinion, this allows the reader to quickly get an understanding of the core concepts of the material. (Richard Jankowski, ACM SIGACT News, Vol. 39 (2), 2008)


Aus den Rezensionen: ! Der chronologische Abriss uber die Entwicklung der Computer-Viren ist sehr interessant und verdeutlicht ! einmal mehr, wo der eigentliche Schwerpunkt des ! Buches liegt. Richtig nutzlich sind ! die Schlussbemerkungen. ! Zahlreich Hinweise auf Literatur und Internet-Seiten garnieren den Text. ! David Salomon schmuckt zur Auflockerung den Text mit vielen Zitaten und kurzen Hintergrundgeschichten. ! Ebenfalls auflockernd sind die vielen Aubungsaufgaben, deren Losungen am Buchende nachgeschlagen werden konnen. Das Register ist sehr umfassend, man merkt, dass der Autor sehr grossen Wert auf einen detaillierten Index legt ! (Dr. Udo Seidel, in: www.wissenschaft-online.de, 28. Dez. 2008)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List