Computer Systems Security: Planning for Success
Ryan Tolboom, Newark, NJ
Publisher: Ryan Tolboom
Language: English
Formats Available
Conditions of Use
Attribution-NonCommercial-ShareAlike
CC BY-NC-SA
Reviews
The book is a great foundation but needs more content aligned with the Security+ certification exam since the majority of our students are required to take this course. It also lacks sections on ethics, privacy, and legal topics. read more
The book is a great foundation but needs more content aligned with the Security+ certification exam since the majority of our students are required to take this course. It also lacks sections on ethics, privacy, and legal topics.
I have only found minor errors and feel the book is overall accurate.
The content is extremely relevant and necessary in today's environment. I would also like to see some content on generative AI and how it is being used in computer security.
The text is clear and concise - and appropriate for my current students.
The book is consistent and easy to follow. Some sections could be better presented.
The chapters are well-defined and allow for modularity with no disruption.
The book is well organized and flows well with no disruption.
I found no issues with navigation or interface.
Only minor grammatical errors - do not significantly detract from the text.
I did not see any issues that violate inclusivity.
The book is a great foundation but needs more content aligned with the Security+ certification exam since most of our students must take this course. It also lacks sections on ethics, privacy, and legal topics.
One can get a graduate degree in computer systems security, so full comprehensiveness in a usable text is not actually a desirable feature. This text is appropriately comprehensive for a beginning-level on the subject. read more
One can get a graduate degree in computer systems security, so full comprehensiveness in a usable text is not actually a desirable feature. This text is appropriately comprehensive for a beginning-level on the subject.
While I have not yet used the text in my classroom, I have evaluated it for adoption, and I have found no inaccuracies.
Relevance and currency are of particular importance in computer systems security, and I have been impressed by this book thus far. Some of the labs will need to be kept up-to-date, but I do not see this as a failing of the text, just a necessity of the subject.
The clarity and lack of unexplained technical jargon is one of the key reasons that I have adopted this text for a beginning-level course on this topic.
I have not found any inconsistencies.
It is impossible in a text of this type not to have the material build upon what has come before. This text is designed to align with the objectives CompTIA Security+ SY0-601 exam, so that drive the organization. However, the text has been very well organized into chapters, sections, subsections, and even practical labs and review questions.
While I have not yet used it, during my review I thought the organization seemed excellent. It seems very easy to follow.
It is a simple interface in a hyperlinked pdf. I found it very easy to navigate.
I have found no grammatical or structural errors in the text.
I have not found culturally insensitive, gender-insensitive, or other insensitive material in the text. For example, in discussing hacker culture, the presentation seems very appropriate.
I was very happy to find an open-source security book that is at a beginning level. I have adopted it for a course that I will be teaching in the summer of 2024.
The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well. read more
The text covers all areas and ideas of the subject appropriately. The labs are also great and helps the student understand the material very well.
Content is accurate, error-free and unbiased.
The book is relevant and fits the objectives of the latest CompTIA Security + examination. This will help the authors to update the text as the objectives of the examinations of the examination changes in future.
The book is very clear and appeals to technical and non-technical readers. The use of diagrams are also very helpful.
In terms of terminology and framework, the text is quite consistent.
The text is easily and readily divisible into smaller reading sections that can be assigned at different points within the course.
I think the author introduces the principle of Cryptography a bit to early (chapter 2) before foundational networking topics like Protocols (chapter 4) and Access Control (chapter 7).
The interface of the book is very satisfactory and poses no element of confusion or distraction to the reader.
The text has no grammatical errors. The language of presentation is suitable for all readers, independent of race or ethnicity.
I believe the book is culturally sensitive and fits readers from all races and backgrounds.
The book serves as an introduction to the field of computer security. The author kept it simple to attract newcomers to the field and also put in screenshots of code that will appeal to advanced users. By aligning the book to the objectives of the popular CompTIA Security + SY0-601 certification examination, the book will serve many people who are transiting from other fields into the field of cybersecurity. Access to labs also puts the book above other similar ones.
This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts. read more
This book might be good for a 101 course. It presents a high-level overview of a number of concepts related to Cybersecurity but doesn't go into much depth; a good primer on terminology and basic concepts.
I didn't see any glaring inaccuracies
The field of Cybersecurity is rapidly evolving. By the time something is in print, it is already outdated.
Extremely clear and easy to understand
Consistent tone and voice
I appreciated how neatly the chapters map to a 15-week semester.
Each chapter builds nicely onto the next.
I viewed the PDF version; no issues with the interface
No grammatical issues found
All examples were presented in a neutral way without reference to culture or ethnicity.
Table of Contents
- Legal
- Acknowledgements
- Instructional Notes
- 1. Introduction
- 2. Cryptography
- 3. Malware
- 4. Protocols
- 5 Attacks
- 6. Security Solutions
- 7. Access Controls
- 8. Vulnerability Management and Compliance
- 9. Incident Response and Continuity
- 10. Virtualization
Ancillary Material
Submit ancillary resourceAbout the Book
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security. With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
About the Contributors
Author
Ryan Tolboom, New Jersey Institute of Technology