

File Size: 39452 KB
Print Length: 840 pages
Simultaneous Device Usage: Up to 2 simultaneous devices, per publisher limits
Publisher: Pearson; 3 edition (June 30, 2014)
Publication Date: June 30, 2014
Sold by: Digital Services LLC
Language: English
ASIN: B00XIH1ZZ6
Text-to-Speech: Not enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #321,898 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #145 in Books > Computers & Technology > Certification > Security #1122 in Books > Computers & Technology > Security & Encryption #4655 in Kindle Store > Kindle eBooks > Computers & Technology

Unless you're already steeped in the cyber security field, (possibly not needing this book) it would best to look elsewhere! And possibly even if you're already steeped in the field, which I'm not, you probably can still find a much better book for learning.I find the book poorly written (like basic sentence structure, etc.), confusingly annotated, and even the very thin glossy paper makes it difficult to read. Further, each chapter is choppily presented, starting briefly with few basic concepts. But before those are truly explained, it veers into highly complicated mathematical ones.and a seeming insider's academically competitive view of who discovered what, leaving even the essential understandings "in the dust."BUT MY BIGGEST GRIPE is the price, which comes with time-consuming, ultra-frustrating hoops and unannounced limitations through which Pearson puts their customers to try to obtain what they promise for learning from their stuff.Required for a law course on my end, I was told not to buy used, but to spend the more than $140 (incl. taxes) to buy new, with the access codes bound in, giving access to online Power Points and Q&A's which supposedly make understanding easier. I have spent over 4 hours now trying to get their very messily printed, unworkable "access codes" to work, have talked to their customer support in the Phillipines and have jumped through their hoops for over an hour, etc. and still can't get into the Pearson online "premium site".Upon my first call to customer support,, I got to a man who seemed to take over my screen, with the page scrolling without my touching the computer (creepy!) When I asked him about that he hung up on me.The second customer support person was nice, but very difficult to understand.
Book Review for SDSUGComputer Security Principles and Practice 3rd Ed.William Stallings & Lawrie BrownPearson, 820 PagesList Price: $135-140What he first open the book you will notice that the table of contents is very long. The preface lists what is new to background and interestingly objectives which I found very useful, it also discusses CISSP coverage areas and lists additional student resources. At the first chapter, chapter zero, gives an outline of the book and lists support for various certifications. The first chapter opens with Computer Security concepts, by first defining what Computer Security is some of the challenges and a model for Computer Security one thing I found particularly interesting was a review of a of the fundamental security design principles and attack at vectors. The book also combines several chapters into parts, with part one being Computer Security Technology and principals. The section on digital signatures and key management was very interesting and useful sense public key encryption is becoming more and more popular it is especially relevant for those of us who work in the Department of Defense or other Federal sectors. All chapters end with practical applications, review questions and a listing of key terms. I personally found the review of key terms to be very useful, especially if you are using this book to teach Computer Security.Chapter 5 covers database and cloud security. The diagrams of cloud service models are provided, which include software as a service, platform as a Service and infrastructure as a service; NIST deployment models are also covered. One of the highlights chapter was a security risks and countermeasures, including shared technology issues and unknown risks profiles.
Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Hacking: Computer Hacking:The Essential Hacking Guide for Beginners, Everything You need to know about Hacking, Computer Hacking, and Security ... Bugs, Security Breach, how to hack) Computer Security: Principles and Practice (3rd Edition) Computer Security: Principles and Practice (2nd Edition) (Stallings) Computer Security: Principles and Practice The Myths of Security: What the Computer Security Industry Doesn't Want You to Know Digital Logic Design and Computer Organization with Computer Architecture for Security Principles of Computer Security Lab Manual, Fourth Edition Principles of Computer Security, Fourth Edition (Official Comptia Guide) Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science Python: Python Programming For Beginners - The Comprehensive Guide To Python Programming: Computer Programming, Computer Language, Computer Science (Machine Language) Principles And Practice of Mechanical Ventilation, Third Edition (Tobin, Principles and Practice of Mechanical Ventilation) Principles and Practice of Gynecologic Oncology (Principles and Practice of Gynecologic Oncology (Hoskins)) ASTNA Patient Transport: Principles and Practice, 4e (Air & Surface Patient Transport: Principles and Practice) DeVita, Hellman, and Rosenberg's Cancer: Principles & Practice of Oncology (Cancer: Principles & Practice (DeVita)(2 Volume Set) Cryptography and Network Security: Principles and Practice (3rd Edition) Cryptography and Network Security: Principles and Practice (2nd Edition) Dynamic Networks and Cyber-Security: 1 (Security Science and Technology) Operating System Security (Synthesis Lectures on Information Security, Privacy, and Trust) Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption