

Hardcover: 840 pages
Publisher: Pearson; 3 edition (July 18, 2014)
Language: English
ISBN-10: 0133773922
ISBN-13: 978-0133773927
Product Dimensions: 7.2 x 1.3 x 9.2 inches
Shipping Weight: 2.7 pounds (View shipping rates and policies)
Average Customer Review: 3.0 out of 5 stars See all reviews (15 customer reviews)
Best Sellers Rank: #111,563 in Books (See Top 100 in Books) #47 in Books > Computers & Technology > Certification > Security #303 in Books > Computers & Technology > Security & Encryption #1484 in Books > Textbooks > Computer Science

Unless you're already steeped in the cyber security field, (possibly not needing this book) it would best to look elsewhere! And possibly even if you're already steeped in the field, which I'm not, you probably can still find a much better book for learning.I find the book poorly written (like basic sentence structure, etc.), confusingly annotated, and even the very thin glossy paper makes it difficult to read. Further, each chapter is choppily presented, starting briefly with few basic concepts. But before those are truly explained, it veers into highly complicated mathematical ones.and a seeming insider's academically competitive view of who discovered what, leaving even the essential understandings "in the dust."BUT MY BIGGEST GRIPE is the price, which comes with time-consuming, ultra-frustrating hoops and unannounced limitations through which Pearson puts their customers to try to obtain what they promise for learning from their stuff.Required for a law course on my end, I was told not to buy used, but to spend the more than $140 (incl. taxes) to buy new, with the access codes bound in, giving access to online Power Points and Q&A's which supposedly make understanding easier. I have spent over 4 hours now trying to get their very messily printed, unworkable "access codes" to work, have talked to their customer support in the Phillipines and have jumped through their hoops for over an hour, etc. and still can't get into the Pearson online "premium site".Upon my first call to customer support,, I got to a man who seemed to take over my screen, with the page scrolling without my touching the computer (creepy!) When I asked him about that he hung up on me.The second customer support person was nice, but very difficult to understand.
Book Review for SDSUGComputer Security Principles and Practice 3rd Ed.William Stallings & Lawrie BrownPearson, 820 PagesList Price: $135-140What he first open the book you will notice that the table of contents is very long. The preface lists what is new to background and interestingly objectives which I found very useful, it also discusses CISSP coverage areas and lists additional student resources. At the first chapter, chapter zero, gives an outline of the book and lists support for various certifications. The first chapter opens with Computer Security concepts, by first defining what Computer Security is some of the challenges and a model for Computer Security one thing I found particularly interesting was a review of a of the fundamental security design principles and attack at vectors. The book also combines several chapters into parts, with part one being Computer Security Technology and principals. The section on digital signatures and key management was very interesting and useful sense public key encryption is becoming more and more popular it is especially relevant for those of us who work in the Department of Defense or other Federal sectors. All chapters end with practical applications, review questions and a listing of key terms. I personally found the review of key terms to be very useful, especially if you are using this book to teach Computer Security.Chapter 5 covers database and cloud security. The diagrams of cloud service models are provided, which include software as a service, platform as a Service and infrastructure as a service; NIST deployment models are also covered. One of the highlights chapter was a security risks and countermeasures, including shared technology issues and unknown risks profiles.
Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Computer Security: Principles and Practice (3rd Edition) Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) Computer Security: Principles and Practice (2nd Edition) (Stallings) Cryptography and Network Security: Principles and Practice (3rd Edition) Computer Security: Principles and Practice The Myths of Security: What the Computer Security Industry Doesn't Want You to Know Digital Logic Design and Computer Organization with Computer Architecture for Security Principles of Computer Security Lab Manual, Fourth Edition Principles of Computer Security, Fourth Edition (Official Comptia Guide) Principles And Practice of Mechanical Ventilation, Third Edition (Tobin, Principles and Practice of Mechanical Ventilation) Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science (Machine Language) Principles and Practice of Gynecologic Oncology (Principles and Practice of Gynecologic Oncology (Hoskins)) ASTNA Patient Transport: Principles and Practice, 4e (Air & Surface Patient Transport: Principles and Practice) DeVita, Hellman, and Rosenberg's Cancer: Principles & Practice of Oncology (Cancer: Principles & Practice (DeVita)(2 Volume Set) Cryptography and Network Security: Principles and Practice (2nd Edition) Security Analysis: Sixth Edition, Foreword by Warren Buffett (Security Analysis Prior Editions) Principles of Public Health Practice, 3rd Edition Dynamic Networks and Cyber-Security: 1 (Security Science and Technology)