Skip to content

Read more about Computer Systems Security: Planning for Success

Computer Systems Security: Planning for Success

(3 reviews)

Ryan Tolboom, Newark, NJ

Publisher: Ryan Tolboom

Language: English

Formats Available

Conditions of Use

Attribution-NonCommercial-ShareAlike Attribution-NonCommercial-ShareAlike
CC BY-NC-SA

Reviews

Learn more about reviews.

Reviewed by Jan Pearce, Professor of Computer and Information Science, Berea College on 12/11/23

One can get a graduate degree in computer systems security, so full comprehensiveness in a usable text is not actually a desirable feature. This text is appropriately comprehensive for a beginning-level on the subject. read more

Reviewed by Felix Olowononi, Assistant Professor of Cybersecurity, Marymount University on 6/21/23

The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well. read more

Reviewed by Laurie Alfaro, Associate Professor, City Colleges of Chicago on 5/12/23

This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts. read more

Table of Contents

  • Legal
  • Acknowledgements
  • Instructional Notes
  • 1. Introduction
  • 2. Cryptography
  • 3. Malware
  • 4. Protocols
  • 5 Attacks
  • 6. Security Solutions
  • 7. Access Controls
  • 8. Vulnerability Management and Compliance
  • 9. Incident Response and Continuity
  • 10. Virtualization

Ancillary Material

Submit ancillary resource

About the Book

The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.

About the Contributors

Author

Ryan Tolboom, New Jersey Institute of Technology

Contribute to this Page

Suggest an edit to this book record