Computer Security: Principles and Practice, 2e, is ideal ""for courses in Computer/Network Security."In recent years, the need for education in computer security and related topics has grown dramatically and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject.In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association named "Computer Security: Principles and Practice, 1e, "the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.Visit Stallings' Companion Website at http: //williamstallings.com/CompSec/CompSec1... student and instructor resources and his Computer Science Student Resource site http: //williamstallings.com/StudentSupport.html
William Stallings is an American author. He has written computer science textbooks on operating systems, computer networks, computer organization, and cryptography.
This was the textbook for our postgraduate information security course. Having read it cover to cover, I can say that it is, if nothing else, quite thorough. Unfortunately it is also quite dry. But as textbooks go, this one is not bad. It contains clear descriptions and diagrams of the important security algorithms and protocols, and offers industry insights from authors who are clearly very experienced in the field.
Even though by fourth edition they claim a 2017 print date, too much of this book is out of date. For example, the table of biometric authentication reliability data is from 2001, far before touchID and FaceID.
This book tries to take on too much, and discusses a security design much more than providing examples of breaches. In my opinion, a key part of studying security is practically reviewing recovery from failures, and concretely examining potential future attacks. Cryptography is effectively relegated to an appendix. The chapters seem arbitrarily ordered.
This may still be the best textbook on cyber security, that shows a big market opportunity. None of the chapters go deep enough to be sufficient for real world understanding.
This book is poorly written. There are so many sentence structures that don’t make any sense and many grammatical errors . I am using this book for one of my undergrad classes and it is pretty difficult for a beginner. It does not give any examples and it is poorly structured (jumping quickly from one thing to next). The questions at the end of the chapter are sometimes too complex and usually the book did not even mention them. I wouldn’t recommend this book.
This was a textbook for graduate Information Security course. Being a textbook, it's deep rooted in theory and strongly references NIST and ISO documents pertaining to computer security. This book does well in preparing security practitioners with the mindset for performing hands on work.
This new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security. Required reading for class, which was in many ways a refresher of security classes taken in the past, though the instructor made the class dry and boring the book is informative.
Used as one of 3 books for my first Master's Degree class in Cyber Security. 2 stars because unless you buy this book new, you will have to pay an additional $20 to access the Appendices. I just can't wrap my mind around selling 1 book twice & making an additional $20 for every subsequent student, who already paid too much for the book whether it was used or a rental. It is completely jacked up to sell an incomplete book and expect extra money for the rest of it. It has decent information, but the same info is also covered by Panko or Smith in similar books that are sold as complete packages.
I read a few key chapters and skimmed a few others because they were not required. I found that it did indeed compliment Nigel's cryptography book very well. If you try to study computer security on your own, I suggest buying both versions (Nigel's is a free download).