

Hardcover: 784 pages
Publisher: Addison-Wesley Professional; 1 edition (November 5, 2004)
Language: English
ISBN-10: 0321247442
ISBN-13: 978-0321247445
Product Dimensions: 7.6 x 1.3 x 9.4 inches
Shipping Weight: 3 pounds (View shipping rates and policies)
Average Customer Review: 3.5 out of 5 stars See all reviews (24 customer reviews)
Best Sellers Rank: #436,879 in Books (See Top 100 in Books) #100 in Books > Computers & Technology > Certification > CompTIA #541 in Books > Textbooks > Computer Science > Networking #1136 in Books > Computers & Technology > Security & Encryption

I recently finished the book Introduction to Computer Security by Matt Bishop (Addison-Wesley). I hope to be fair on this review, but I'm probably going to be a little harsh...Chapter list: Preface; An Overview of Computer Security; Access Control Matrix; Foundational Results; Security Policies; Confidentiality Policies; Integrity Policies; Hybrid Policies; Basic Cryptography; Key Management; Cipher Techniques; Authentication; Design Principles; Representing Identity; Access Control Mechanisms; Information Flow; Confinement Problem; Introduction to Assurance; Evaluating Systems; Malicious Logic; Vulnerability Analysis; Auditing; Intrusion Detection; Network Security; System Security; User Security; Program Security; Lattices; The Extended Euclidean Algorithm; Virtual Machines; Bibliography; IndexOK, for the good stuff. This is probably one of the most complete academic treatments of computer security that I've ever seen. According to the preface, this is a "condensed" and updated version of the author's earlier work, Computer Security: Art and Science. His three goals, which are probably met, are to show the importance of theory to practice/practice to theory, to emphasize that computer security and cryptography are different, and to demonstrate that computer security is a science *and* an art. He also considers this book to omit much of the mathematical formalism. And that's where I start to have problems. In my opinion, he missed his target entirely.
(NOTE: The title of this book when it was originally published was "Security for the Practical Administrator". Thus, my review reflects what I still firmly believe were an inappropriate title and cover notes. Some time after that, the book was renamed to its current title. So, if you're confused as to my statements about it not being "practical", that's why.)I hate to be the fly in the ointment of the other reviews. But as someone who is more concerned with protecting his networks than trying to figure out the math behind the security, I found this book's title and description on the back cover as well as in the preface to be *highly* misleading.By reading the preface and the back of the book, you gain absolutely no indication that this book is mired in mathematical theory with very little practical application to the everyday, IT environment. The only possible audience for this book comprises computer science students and software engineers who are into encryption, cipher algorithms, and related theories. There is absolutely no indication of that until you actually start getting into the chapters.That is not to belittle Mr. Bishop, what he knows, or what he does. I have no doubt that as a professor at the University of California at Davis he is well respected and very knowledgeable of his field. I'm equally sure that in a scientific, trivia challenge, his knowledge and experience would beat me into the ground until I was just a thin, red film. I'm only saying that this book is not one that I can recommend to anyone who is looking for practical, security solutions, contrary to what the title might infer.
Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) The Myths of Security: What the Computer Security Industry Doesn't Want You to Know Digital Logic Design and Computer Organization with Computer Architecture for Security Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science (Machine Language) Introduction to Computer Security Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust) CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption Programmer's Ultimate Security DeskRef: Your programming security encyclopedia Security Risk Management: Building an Information Security Risk Management Program from the Ground Up Security Analysis: Sixth Edition, Foreword by Warren Buffett (Security Analysis Prior Editions) 6 Months to 6 Figure Passive Income: Anyone Can Do It - Guide to Guaranteed Financial Security .. Make Money While You Sleep (Personal Financial Security) Security Risk Assessment: Managing Physical and Operational Security Dynamic Networks and Cyber-Security: 1 (Security Science and Technology) Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies Tcp/Ip: Architcture, Protocols, and Implementation With Ipv6 and Ip Security (Mcgraw-Hill Computer Communications) TCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security (McGraw-Hill Computer Communications Series) Principles of Computer Security Lab Manual, Fourth Edition