Computer Security Handbook

Author: Seymour Bosworth, Michel E. Kabay
List Price: $80.00
Our Price: Click to see the latest and low price
ISBN: 0471412589
Publisher: John Wiley & Sons (05 April, 2002)
Edition: Paperback
Sales Rank: 88,621
Average Customer Rating: 5 out of 5

Buy now directly from Amazon.com - Purchase this book, safely and securely from the largest book dealer on the Internet, Amazon.com

Customer Reviews

Rating: 5 out of 5
Excellent info security reference
Overall, the Computer Security Handbook is about the best single-source book on computer security available.

The topics cover just about every area of infosec.

On one side, the fact that the book has chapters from over 30 authors makes the book lack a consistent style. On the other side, the diversity of authors shows various points of view for an assortment of different security topics.

The overall orderliness of the chapter's developers in a coherent manner. It starts with the basics of information security and then develops into higher-level issues.

Taken as a whole, the Computer Security Handbook is an excellent reference.


Rating: 5 out of 5
Computer Security Handbook
This book is a must have for anyone working in the Information Assurance/Computer Security field. "Big Blue" was written by experienced professionals who are considered experts in their field. The book contains sections pertaining to every conceivable aspect of Infomation Assurance. I am currently using this book in my Masters program at Norwich University, and will continue to use it as a reference for many years to come. Mich Kabay and Sy Bosworth are to be commended for consolidating all of this information into one superb book. Great job!!


Rating: 5 out of 5
The Only Book that covers all aspects of Computer Security
I am offering an IT Security undergraduate course for the first time this Fall in a Business School environment. I reviewed many books on IT security before I selected this title for my course. The vast majority of Security books are nuts-and-bolts oriented, great for Engineers and Computer Scientists but lacking depth for the IT manager.

This book is a welcome relief since it contains such a wealth of information valuable to anyone working as an IT practitioner. It has several strenghts that other IS security books do not have: The current edition has been revised since the events of September 11th and thoughtfully reflects the change of the collective mindset of the IT world. Secondly, each Chapter is written by an expert in their respective fields. Thirdly, there is is a collection of references and links at the end of each Chapter which I found to be particularly valuable.

My course covers about half the topics in this book. The chapters on: Information Warfare, Denial of Service Attacks, Protecting Internet Visible Systems, Public Key Infrastructure and Computer Audit stand out in my mind as outstanding.

I intend to use this book again next Fall when this course is offered once more.

Similar Products

· Computer Forensics : Incident Response Essentials
· Information Security Risk Analysis
· Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
· Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
· Information Security Management Handbook, Fourth Edition, Volume I

Return To Main Computer Book IndexSearch Our Entire Computer Book Catalog